Sciweavers

19010 search results - page 3710 / 3802
» Adapting to adaptive testing
Sort
View
CE
2007
176views more  CE 2007»
13 years 10 months ago
Pedagogical approaches for technology-integrated science teaching
The two separate projects described have examined how teachers exploit computer-based technologies in supporting learning of science at secondary level. This paper examines how pe...
Sara Hennessy, Jocelyn Wishart, Denise Whitelock, ...
CEE
2007
110views more  CEE 2007»
13 years 10 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
IDA
2006
Springer
13 years 10 months ago
Backward chaining rule induction
Exploring the vast number of possible feature interactions in domains such as gene expression microarray data is an onerous task. We describe Backward-Chaining Rule Induction (BCR...
Douglas H. Fisher, Mary E. Edgerton, Zhihua Chen, ...
IJSNET
2008
126views more  IJSNET 2008»
13 years 10 months ago
Reliable and energy-efficient routing protocol in dense wireless sensor networks
Delivering sensed data to the sink reliably in sensor networks calls for a scalable, energy-efficient, and error-resilient routing solution. In this paper, a reliable energy-effic...
Min Chen, Taekyoung Kwon, Shiwen Mao, Yong Yuan, V...
CN
2007
168views more  CN 2007»
13 years 10 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
« Prev « First page 3710 / 3802 Last » Next »