Sciweavers

163 search results - page 26 / 33
» Collective Problem Solving Through Coordinated Reaction
Sort
View
CEAS
2006
Springer
14 years 10 days ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
AAAI
1990
13 years 9 months ago
Backward Model Tracing: An Explanation-Based Approach for Reconstructing Student Reasoning
An original methodology, called backward model tracing to model student performance which features a profitable integration of the bug collection and bug construction techniques i...
Danilo Fum, Paolo Giangrandi, Carlo Tasso
CCGRID
2008
IEEE
14 years 3 months ago
GridBatch: Cloud Computing for Large-Scale Data-Intensive Batch Applications
To be competitive, Enterprises are collecting and analyzing increasingly large amount of data in order to derive business insights. However, there are at least two challenges to m...
Huan Liu, Dan Orban
JCDL
2004
ACM
128views Education» more  JCDL 2004»
14 years 2 months ago
Panorama: extending digital libraries with topical crawlers
A large amount of research, technical and professional documents are available today in digital formats. Digital libraries are created to facilitate search and retrieval of inform...
Gautam Pant, Kostas Tsioutsiouliklis, Judy Johnson...
ICPPW
2009
IEEE
14 years 3 months ago
Dynamic Control and Resource Allocation in Wireless-Infrastructured Distributed Cellular Networks with OFDMA
—In this paper, we consider joint optimization of end-to-end data transmission and resource allocation for Wireless-Infrastructured Distributed Cellular Networks (WIDCNs), where ...
Lei You, Ping Wu, Mei Song, Junde Song, Yong Zhang