Sciweavers

136 search results - page 24 / 28
» A Group Learning Management Method for Intelligent Tutoring ...
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 5 months ago
A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks
The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users...
H. S. Ramesh Babu, Gowrishankar, P. S. Satyanaraya...
WWW
2008
ACM
14 years 8 months ago
Extraction and mining of an academic social network
This paper addresses several key issues in extraction and mining of an academic social network: 1) extraction of a researcher social network from the existing Web; 2) integration ...
Jie Tang, Jing Zhang, Limin Yao, Juan-Zi Li
KBS
2000
122views more  KBS 2000»
13 years 7 months ago
Creating knowledge maps by exploiting dependent relationships
Knowledge is an interesting concept that has attracted the attention of philosophers for thousands of years. In more recent times, researchers have investigated knowledge in a mor...
John L. Gordon
ICAI
2008
13 years 9 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
SIGIR
2005
ACM
14 years 1 months ago
On the collective classification of email "speech acts"
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...
Vitor Rocha de Carvalho, William W. Cohen