Sciweavers

1809 search results - page 214 / 362
» Using GDE in Educational Systems
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Stochastic Games for Security in Networks with Interdependent Nodes
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take pa...
Kien C. Nguyen, Tansu Alpcan, Tamer Basar
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 4 months ago
Liberalizing Dependency
Abstract. The dependency core calculus (DCC), a simple extension of the computational lambda calculus, captures a common notion of dependency that arises in many programming langua...
Avik Chaudhuri
CORR
2010
Springer
161views Education» more  CORR 2010»
15 years 4 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...
CORR
2010
Springer
171views Education» more  CORR 2010»
15 years 4 months ago
An Object-Oriented Metamodel for Bunge-Wand-Weber Ontology
A UML based metamodel for Bunge-Wand-Weber (BWW) ontology is presented. BWW ontology is a generic framework for analysis and conceptualization of real world objects. It includes c...
Arvind W. Kiwelekar, Rushikesh K. Joshi
CORR
2010
Springer
101views Education» more  CORR 2010»
15 years 4 months ago
Construction and Applications of CRT Sequences
Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the p...
Kenneth W. Shum, Wing Shing Wong