Sciweavers

3651 search results - page 716 / 731
» Data Mining for Security Applications
Sort
View
AH
2008
Springer
14 years 4 months ago
Analysing High-Level Help-Seeking Behaviour in ITSs
Abstract. In this paper, we look at initial results of data mining students’ help-seeking behaviour in two ITSs: SQL-Tutor and EER-Tutor. We categorised help given by these tutor...
Moffat Mathews, Tanja Mitrovic, David Thomson
DSN
2007
IEEE
14 years 4 months ago
Utilizing Dynamically Coupled Cores to Form a Resilient Chip Multiprocessor
Aggressive CMOS scaling will make future chip multiprocessors (CMPs) increasingly susceptible to transient faults, hard errors, manufacturing defects, and process variations. Exis...
Christopher LaFrieda, Engin Ipek, José F. M...
IROS
2006
IEEE
159views Robotics» more  IROS 2006»
14 years 3 months ago
Multi-Level Surface Maps for Outdoor Terrain Mapping and Loop Closing
— To operate outdoors or on non-flat surfaces, mobile robots need appropriate data structures that provide a compact representation of the environment and at the same time suppo...
Rudolph Triebel, Patrick Pfaff, Wolfram Burgard
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
14 years 3 months ago
Constructive induction and genetic algorithms for learning concepts with complex interaction
Constructive Induction is the process of transforming the original representation of hard concepts with complex interaction into a representation that highlights regularities. Mos...
Leila Shila Shafti, Eduardo Pérez
HT
2003
ACM
14 years 3 months ago
Enhanced web document summarization using hyperlinks
This paper addresses the issue of Web document summarization. As textual content of Web documents is often scarce or irrelevant and existing summarization techniques are based on ...
Jean-Yves Delort, Bernadette Bouchon-Meunier, Mari...