Sciweavers

515 search results - page 13 / 103
» A Strategy for Information Source Identification
Sort
View
155
Voted
EGICE
2006
15 years 7 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
121
Voted
IADIS
2004
15 years 4 months ago
Erroneous Examples as a Source of Learning in Mathematics
We analyze why and how erroneous examples can be beneficially employed in learning mathematics. The `Why' addresses reasoning and attitudes that are rarely fostered in today&...
Erica Melis
141
Voted
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
16 years 23 days ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
146
Voted
KYOTODL
2000
122views more  KYOTODL 2000»
15 years 4 months ago
Federation Services for Heterogeneous Digital Libraries Accessing Cooperative and Non-Cooperative Sources
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
Martin Endig, Michael Höding, Gunter Saake, K...
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
15 years 3 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...