Sciweavers

17789 search results - page 61 / 3558
» Exceptional Use Cases
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
13 years 7 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
EWCBR
2008
Springer
13 years 9 months ago
Conversational Case-Based Recommendations Exploiting a Structured Case Model
There are case-based recommender systems that generate personalized recommendations for users exploiting the knowledge contained in past recommendation cases. These systems assume ...
Quang Nhat Nguyen, Francesco Ricci
INFORMATICALT
2002
150views more  INFORMATICALT 2002»
13 years 7 months ago
Search for Dynamic Equilibrium in Duel Problems by Global Optimization
Two examples of open-loop differential games are considered in the paper. Starting with simplified dynamic Duel, further it was developed to differential economic Duel modelling pr...
Raimundas Matulevicius
NIPS
2001
13 years 9 months ago
An Efficient Clustering Algorithm Using Stochastic Association Model and Its Implementation Using Nanostructures
This paper describes a clustering algorithm for vector quantizers using a "stochastic association model". It offers a new simple and powerful softmax adaptation rule. Th...
Takashi Morie, Tomohiro Matsuura, Makoto Nagata, A...
TREC
2004
13 years 9 months ago
DalTREC 2004: Question Answering Using Regular Expression Rewriting
This is the first year that the Dalhousie University participated in TREC. We submitted three runs for the QA track. Our evaluation results are generally below the median (with on...
Vlado Keselj, Anthony Cox