Sciweavers

3104 search results - page 11 / 621
» Competence-Based EE-Learning: (How) Can We Implement It
Sort
View
COMPGEOM
1995
ACM
15 years 7 months ago
How Good are Convex Hull Algorithms?
A convex polytope P can be speci ed in two ways: as the convex hull of the vertex set V of P, or as the intersection of the set H of its facet-inducing halfspaces. The vertex enum...
David Avis, David Bremner
IEEEARES
2007
IEEE
15 years 10 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
JDS
2007
104views more  JDS 2007»
15 years 4 months ago
Operational Risk Management How an I-DSS May Help
Operational Risk management, the least covered component of Enterprise Wide Risk Management, needs intelligent tools to implement Comprehensive Emergency Management Programs. In t...
Pedro A. C. Sousa, João Paulo Pimentã...
IJMI
2002
82views more  IJMI 2002»
15 years 3 months ago
Protein names and how to find them
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...
Kristofer Franzén, Gunnar Eriksson, Fredrik...
AGP
2010
IEEE
15 years 7 months ago
Agents, Multi-Agent Systems and Declarative Programming: What, When, Where, Why, Who, How?
This chapter tackles the relation between declarative languages and multi-agent systems by following the dictates of the five Ws (and one H) that characterize investigations. The ...
Matteo Baldoni, Cristina Baroglio, Viviana Mascard...