Sciweavers

1893 search results - page 334 / 379
» Eliciting and Validating Knowledge in Knowledge Management S...
Sort
View
SYNASC
2006
IEEE
91views Algorithms» more  SYNASC 2006»
14 years 2 months ago
MATHsAiD: A Mathematical Theorem Discovery Tool
In the eld of automated reasoning, one of the most challenging (even if, perhaps, somewhat overlooked) problems thus far has been to develop a means of discerning, from amongst al...
Roy L. McCasland, Alan Bundy
DOLAP
2006
ACM
14 years 2 months ago
HYPE: mining hierarchical sequential patterns
Mining data warehouses is still an open problem as few approaches really take the specificities of this framework into account (e.g. multidimensionality, hierarchies, historized ...
Marc Plantevit, Anne Laurent, Maguelonne Teisseire
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
DEXAW
2005
IEEE
140views Database» more  DEXAW 2005»
14 years 1 months ago
Effective Dynamic Replication in Wide-Area Network Environments: A Perspective
The unprecedented growth of data at geographically distributed locations coupled with tremendous improvement in networking capabilities over the last decade strongly motivate the ...
Anirban Mondal, Masaru Kitsuregawa
ISESE
2005
IEEE
14 years 1 months ago
Exploratory testing: a multiple case study
Exploratory testing (ET) – simultaneous learning, test design, and test execution – is an applied practice in industry but lacks research. We present the current knowledge of ...
Juha Itkonen, Kristian Rautiainen