Sciweavers

521 search results - page 10 / 105
» Widening the Evaluation Net
Sort
View
EDM
2008
121views Data Mining» more  EDM 2008»
14 years 11 months ago
Analytic Comparison of Three Methods to Evaluate Tutorial Behaviors
We compare the purposes, inputs, representations, and assumptions of three methods to evaluate the fine-grained interactions of intelligent tutors with their students. One method i...
Jack Mostow, Xiaonan Zhang
SAC
2005
ACM
15 years 3 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
ICOIN
2005
Springer
15 years 3 months ago
A Rerouting Scheme with Dynamic Control of Restoration Scope for Survivable MPLS Network
This paper proposes a rerouting scheme that can be applied to the restoration of working Label Switched Paths (LSPs) and preprovisioned backup LSPs, which consists of two subsequen...
Daniel Won-Kyu Hong, Choong Seon Hong
PARLE
1994
15 years 2 months ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki