Sciweavers

5901 search results - page 1018 / 1181
» Virtual Learning Environments
Sort
View
162
Voted
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 7 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
138
Voted
CHI
2007
ACM
15 years 7 months ago
Aligning development tools with the way programmers think about code changes
Software developers must modify their programs to keep up with changing requirements and designs. Often, a conceptually simple change can require numerous edits that are similar b...
Marat Boshernitsan, Susan L. Graham, Marti A. Hear...
149
Voted
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
15 years 7 months ago
The Baldwin effect under spatial isolation and autonomous reproduction
The impact of learning on evolution in dynamic environments undergoes recognized stages of the Baldwin Effect although its cause is not clear. To identify it experimentally, we de...
H. L. Peng, J. C. Tay
134
Voted
ACMACE
2008
ACM
15 years 5 months ago
Evaluation of a pervasive game for domestic energy engagement among teenagers
In this paper, we present Power Agent - a pervasive game designed to encourage teenagers and their families to reduce energy consumption in the home. The idea behind this mobile p...
Anton Gustafsson, Magnus Bång
88
Voted
ATAL
2008
Springer
15 years 5 months ago
Identifying beneficial teammates using multi-dimensional trust
Multi-agent teams must be capable of selecting the most beneficial teammates for different situations. Multi-dimensional trustworthiness assessments have been shown significantly ...
Jaesuk Ahn, Xin Sui, David DeAngelis, K. Suzanne B...
« Prev « First page 1018 / 1181 Last » Next »