Sciweavers

918 search results - page 147 / 184
» Using Predicate-Argument Structures for Information Extracti...
Sort
View
ISW
2007
Springer
15 years 3 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
WWW
2004
ACM
15 years 10 months ago
E-learning personalization based on itineraries and long-term navigational behavior
In this paper we describe a practical framework for studying the navigational behavior of the users of an e-learning environment integrated in a virtual campus. The students navig...
Enric Mor, Julià Minguillón
VISUALIZATION
2002
IEEE
15 years 2 months ago
BLIC: Bi-Level Isosurface Compression
In this paper we introduce a new and simple algorithm to compress isosurface data. This is the data extracted by isosurface algorithms from scalar functions defined on volume gri...
Gabriel Taubin
CIKM
2008
Springer
14 years 11 months ago
Mining conceptual graphs for knowledge acquisition
This work addresses the use of computational linguistic analysis techniques for conceptual graphs learning from unstructured texts. A technique including both content mining and i...
Milagros Fernández, Eric Villemonte de la C...
CORR
2002
Springer
132views Education» more  CORR 2002»
14 years 9 months ago
Exploiting Synergy Between Ontologies and Recommender Systems
Recommender systems learn about user preferences over time, automatically finding things of similar interest. This reduces the burden of creating explicit queries. Recommender sys...
Stuart E. Middleton, Harith Alani, David De Roure