Sciweavers

1846 search results - page 258 / 370
» Computational Model of Speech Understanding
Sort
View
152
Voted
IWCMC
2010
ACM
15 years 8 months ago
Group detection in mobility traces
—Analysis and modeling of wireless networks greatly depend on understanding the structure of underlying mobile nodes. In this paper we present two clustering algorithms to determ...
Yung-Chih Chen, Elisha J. Rosensweig, Jim Kurose, ...
ICDT
2001
ACM
124views Database» more  ICDT 2001»
15 years 8 months ago
Why and Where: A Characterization of Data Provenance
Withthe proliferation of database views and curated databases, the issue of data provenance where a piece of data came from and the process by which it arrived in the database is b...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
EDM
2008
117views Data Mining» more  EDM 2008»
15 years 5 months ago
Integrating Knowledge Gained From Data Mining With Pedagogical Knowledge
Abstract. Discovering knowledge from raw data is one of the goals of data mining. Yet, it is not always clear how this knowledge is used in educational computing systems and how ex...
Roland Hübscher, Sadhana Puntambekar
103
Voted
FLAIRS
2004
15 years 4 months ago
Cellular Automata Approach to Aircraft Corrosion Pit Growth
Corrosion is one of the degrading mechanisms that greatly affect the structural integrity of aerospace components. Corrosion begins with small imperfections in the given material ...
Ramana Pidaparti, Mathew J. Palakal, Long Fong
PST
2004
15 years 4 months ago
Supporting Privacy in E-Learning with Semantic Streams
The goal of the semantic web is to facilitate the exchange of meaningful information in a form that is easy for machines to process. The goal of an e-learning system is to support ...
Lori Kettel, Christopher A. Brooks, Jim E. Greer