Sciweavers

6812 search results - page 1332 / 1363
» Detection of Information Flows
Sort
View
FLAIRS
2004
13 years 9 months ago
Inducing Fuzzy Decision Trees in Non-Deterministic Domains using CHAID
Most decision tree induction methods used for extracting knowledge in classification problems are unable to deal with uncertainties embedded within the data, associated with human...
Jay Fowdar, Zuhair Bandar, Keeley A. Crockett
IADIS
2004
13 years 9 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
EACL
2003
ACL Anthology
13 years 9 months ago
Cohesion and coherence for Automatic Summarization
This paper presents the integration of cohesive properties of text with coherence relations, to obtain an adequate representation of text for automatic summarization. A summarizer...
Laura Alonso Alemany, María Fuentes Fort
ECIS
2003
13 years 9 months ago
Emerging organisations: metateams in major IT projects
During the last decade, teams working on information technology (IT) development and implementation projects have experienced significant transformations. Nowadays, many members o...
Walter D. Fernández, Alan Underwood
IADIS
2003
13 years 9 months ago
A Facial Expression Analysis Component for Affective Tutoring Systems
Intelligent tutoring systems (ITS) provide individualised instruction. They offer many advantages over the traditional classroom scenario: they are always available, non-judgement...
Scott P. Overmyer, Hamid Gholam Hosseini, Chao Fan...
« Prev « First page 1332 / 1363 Last » Next »