Sciweavers

515 search results - page 13 / 103
» A Strategy for Information Source Identification
Sort
View
EGICE
2006
13 years 11 months ago
Combining Two Data Mining Methods for System Identification
System identification is an abductive task which is affected by several kinds of modeling assumptions and measurement errors. Therefore, instead of optimizing values of parameters ...
Sandro Saitta, Benny Raphael, Ian F. C. Smith
IADIS
2004
13 years 8 months ago
Erroneous Examples as a Source of Learning in Mathematics
We analyze why and how erroneous examples can be beneficially employed in learning mathematics. The `Why' addresses reasoning and attitudes that are rarely fostered in today&...
Erica Melis
WSDM
2010
ACM
172views Data Mining» more  WSDM 2010»
14 years 4 months ago
Early Online Identification of Attention Gathering Items In Social Media
Activity in social media such as blogs, micro-blogs, social networks, etc is manifested via interaction that involves text, images, links and other information items. Naturally, s...
Michael Mathioudakis, Nick Koudas, Peter Marbach
KYOTODL
2000
122views more  KYOTODL 2000»
13 years 8 months ago
Federation Services for Heterogeneous Digital Libraries Accessing Cooperative and Non-Cooperative Sources
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
Martin Endig, Michael Höding, Gunter Saake, K...
SIGMETRICS
2002
ACM
115views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Maximum likelihood network topology identification from edge-based unicast measurements
Network tomography is a process for inferring "internal" link-level delay and loss performance information based on end-to-end (edge) network measurements. These methods...
Mark Coates, Rui Castro, Robert Nowak, Manik Gadhi...