Sciweavers

1644 search results - page 245 / 329
» Finding Dominators in Practice
Sort
View
ECIS
2003
13 years 11 months ago
Re-negotiating protocols: a way to integrate groupware in collaborative learning settings
Research is being done within the Computer Supported Collaborative Learning community to investigate how to apply the approach of Problem Oriented Project Pedagogy in distance lea...
Pernille Bjørn Rasmussen
ECIS
2003
13 years 11 months ago
Methods as knowledge enablers in software development organizations
Knowledge management (KM) plays an increasingly important role in software development. We find that a missed aspect of software development methods is their possibility to play a...
Mikael Schönström, Sven A. Carlsson
FIMI
2003
95views Data Mining» more  FIMI 2003»
13 years 11 months ago
Probabilistic Iterative Expansion of Candidates in Mining Frequent Itemsets
A simple new algorithm is suggested for frequent itemset mining, using item probabilities as the basis for generating candidates. The method first finds all the frequent items, an...
Attila Gyenesei, Jukka Teuhola
NIPS
2004
13 years 11 months ago
Worst-Case Analysis of Selective Sampling for Linear-Threshold Algorithms
We provide a worst-case analysis of selective sampling algorithms for learning linear threshold functions. The algorithms considered in this paper are Perceptron-like algorithms, ...
Nicolò Cesa-Bianchi, Claudio Gentile, Luca ...
IJCAI
2003
13 years 11 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván