Sciweavers

1220 search results - page 186 / 244
» Guided Data Repair
Sort
View
IMC
2005
ACM
14 years 3 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
SACMAT
2005
ACM
14 years 3 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
SIGIR
2005
ACM
14 years 3 months ago
When will information retrieval be "good enough"?
We describe a user study that examined the relationship between the quality of an Information Retrieval system and the effectiveness of its users in performing a task. The task i...
James Allan, Ben Carterette, Joshua Lewis
AIED
2005
Springer
14 years 3 months ago
Critical Thinking Environments for Science Education
We have developed a range of critical thinking environments for science education that span several academic content areas, including human biology, geology and forestry. All envir...
Beverly Park Woolf, Tom Murray, David Marshall, To...
FSKD
2005
Springer
180views Fuzzy Logic» more  FSKD 2005»
14 years 3 months ago
An Effective Feature Selection Scheme via Genetic Algorithm Using Mutual Information
Abstract. In the artificial neural networks (ANNs), feature selection is a wellresearched problem, which can improve the network performance and speed up the training of the networ...
Chunkai K. Zhang, Hong Hu