Sciweavers

5465 search results - page 1069 / 1093
» Assigning Types to Processes
Sort
View
COLING
2007
13 years 7 months ago
Computational Linguistics: What About the Linguistics?
eneral, the notion that computation in a serious sense, not just as some highly abstract grounding or, maybe, politically correct meta-reference, has something important to say to ...
Karen Spärck Jones
ISF
2008
210views more  ISF 2008»
13 years 7 months ago
Affective e-Learning in residential and pervasive computing environments
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider ...
Liping Shen, Victor Callaghan, Ruimin Shen
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JCB
2008
159views more  JCB 2008»
13 years 7 months ago
BayesMD: Flexible Biological Modeling for Motif Discovery
We present BayesMD, a Bayesian Motif Discovery model with several new features. Three different types of biological a priori knowledge are built into the framework in a modular fa...
Man-Hung Eric Tang, Anders Krogh, Ole Winther
INFORMATICALT
2006
88views more  INFORMATICALT 2006»
13 years 7 months ago
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques
Abstract. The asynchronous techniques that exist within the programming with distributed constraints are characterized by the occurrence of the nogood values during the search for ...
Ionel Muscalagiu, Vladimir Cretu
« Prev « First page 1069 / 1093 Last » Next »