Sciweavers

4250 search results - page 246 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
119
Voted
ICN
2009
Springer
15 years 5 months ago
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
—Ever since Descartes introduced planar coordinate systems, visual representations of data have become a widely accepted way of describing scientific phenomena. Modern advances ...
Mohammad Hammoudeh, Robert M. Newman, Sarah Mount
133
Voted
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 4 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
86
Voted
AAAI
2007
15 years 3 months ago
Mining Sequential Patterns and Tree Patterns to Detect Erroneous Sentences
An important application area of detecting erroneous sentences is to provide feedback for writers of English as a Second Language. This problem is difficult since both erroneous ...
Guihua Sun, Gao Cong, Xiaohua Liu, Chin-Yew Lin, M...
119
Voted
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 6 months ago
A Two-Level Approach to Making Class Predictions
In this paper we propose a new two-level methodology for assessing countries’/companies’ economic/financial performance. The methodology is based on two major techniques of gr...
Adrian Costea, Tomas Eklund
UAI
2007
15 years 1 months ago
User-Centered Methods for Rapid Creation and Validation of Bayesian Belief Networks
Bayesian networks (BN) are particularly well suited to capturing vague and uncertain knowledge. However, the capture of this knowledge and associated reasoning from human domain e...
Jonathan D. Pfautz, Zach Cox, Geoffrey Catto, Davi...