Sciweavers

8676 search results - page 1680 / 1736
» A Feature Model for an IDE4OCL
Sort
View
148
Voted
DIMVA
2008
15 years 6 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
ICONIP
2007
15 years 6 months ago
Using Generalization Error Bounds to Train the Set Covering Machine
In this paper we eliminate the need for parameter estimation associated with the set covering machine (SCM) by directly minimizing generalization error bounds. Firstly, we consider...
Zakria Hussain, John Shawe-Taylor
130
Voted
IFIP8
2007
15 years 6 months ago
Grid-VirtuE: A Layered Architecture for Grid Virtual Enterprises
A grid virtual enterprise is a community of independent enterprises concerned with a particular sector of the economy. Its members (nodes) are small or medium size enterprises (SME...
Alfredo Cuzzocrea, Alessandro D'Atri, Andrea Gualt...
ACE
2004
193views Education» more  ACE 2004»
15 years 6 months ago
Conversational KM - Student Driven Learning
A conversational method of teaching whereby the students engage each other as a key part of the learning experience achieves a higher percentage of high grades (and presumably bet...
Marilyn A. Wells, Phillip W. Brook
AAAI
2006
15 years 6 months ago
Decision Making in Uncertain Real-World Domains Using DT-Golog
DTGolog, a decision-theoretic agent programming language based on the situation calculus, was proposed to ease some of the computational difficulties associated with Markov Decisi...
Mikhail Soutchanski, Huy Pham, John Mylopoulos
« Prev « First page 1680 / 1736 Last » Next »