Sciweavers

2649 search results - page 481 / 530
» Argumentation for Decision Support
Sort
View
JSS
2010
120views more  JSS 2010»
13 years 8 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
SCN
2010
Springer
187views Communications» more  SCN 2010»
13 years 8 months ago
Searching Keywords with Wildcards on Encrypted Data
Abstract. A hidden vector encryption scheme (HVE) is a derivation of identity-based encryption, where the public key is actually a vector over a certain alphabet. The decryption ke...
Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, P...
ICDIM
2010
IEEE
13 years 8 months ago
Data mining and automatic OLAP schema generation
Data mining aims at extraction of previously unidentified information from large databases. It can be viewed as an automated application of algorithms to discover hidden patterns a...
Muhammad Usman, Sohail Asghar, Simon Fong
IJDET
2010
123views more  IJDET 2010»
13 years 7 months ago
An Adaptive Course Generation Framework
: Existing adaptive e-learning methods are supported by student (user) profiling for capturing student characteristics, and course structuring for organizing learning materials acc...
Frederick W. B. Li, Rynson W. H. Lau, Parthiban Dh...
BMCBI
2011
13 years 5 months ago
DoBo: Protein domain boundary prediction by integrating evolutionary signals and machine learning
Background: Accurate identification of protein domain boundaries is useful for protein structure determination and prediction. However, predicting protein domain boundaries from a...
Jesse Eickholt, Xin Deng, Jianlin Cheng