Sciweavers

144 search results - page 14 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
EDM
2008
117views Data Mining» more  EDM 2008»
13 years 9 months ago
Integrating Knowledge Gained From Data Mining With Pedagogical Knowledge
Abstract. Discovering knowledge from raw data is one of the goals of data mining. Yet, it is not always clear how this knowledge is used in educational computing systems and how ex...
Roland Hübscher, Sadhana Puntambekar
EMSOFT
2007
Springer
14 years 1 months ago
Virtual execution of AADL models via a translation into synchronous programs
Architecture description languages are used to describe both the hardware and software architecture of an application, at system-level. The basic software components are intended ...
Erwan Jahier, Nicolas Halbwachs, Pascal Raymond, X...
CEC
2008
IEEE
14 years 2 months ago
Reduced polynomial neural swarm net for classification task in data mining
—In this paper, we proposed a reduced polynomial neural swarm net (RPNSN) for the task of classification. Classification task is one of the most studied tasks of data mining. In ...
Bijan Bihari Misra, Satchidananda Dehuri, Pradipta...
ICWS
2010
IEEE
13 years 9 months ago
WebMov: A Dedicated Framework for the Modelling and Testing of Web Services Composition
This paper presents a methodology and a set of tools for the modelling, validation and testing of Web service composition, conceived and developed within the French national projec...
Ana R. Cavalli, Tien-Dung Cao, Wissam Mallouli, El...
IGPL
2010
97views more  IGPL 2010»
13 years 6 months ago
A symbolic/subsymbolic interface protocol for cognitive modeling
Researchers studying complex cognition have grown increasingly interested in mapping symbolic cognitive architectures onto subsymbolic brain models. Such a mapping seems essential...
Patrick Simen, Thad A. Polk