Sciweavers

606 search results - page 83 / 122
» A comparative study of architecture knowledge management too...
Sort
View
IDA
2006
Springer
13 years 8 months ago
Backward chaining rule induction
Exploring the vast number of possible feature interactions in domains such as gene expression microarray data is an onerous task. We describe Backward-Chaining Rule Induction (BCR...
Douglas H. Fisher, Mary E. Edgerton, Zhihua Chen, ...
ECTEL
2007
Springer
14 years 3 months ago
Creation of Lithuanian Digital Library of Educational Resources and Services: the Hypothesis, Contemporary Practice, and Future
Currently national digital library of educational resources and services (DLE) for primary and secondary education is under implementation in Lithuania. The article aims to analyse...
Eugenijus Kurilovas, Svetlana Kubilinskiene
IAJIT
2010
115views more  IAJIT 2010»
13 years 7 months ago
Measurement of V2oIP over wide area network between countries using soft phone and USB phone
: In this research, we propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP tech...
Mohd Ismail
ECRTS
2002
IEEE
14 years 1 months ago
A QoS-Sensitive Approach for Timeliness and Freshness Guarantees in Real-Time Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, decision support, web information services, and online trading. In th...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic,...
IAW
2003
IEEE
14 years 2 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...