Sciweavers

2111 search results - page 349 / 423
» How to Program Pervasive Systems
Sort
View
ICML
2005
IEEE
14 years 10 months ago
Learning the structure of Markov logic networks
Markov logic networks (MLNs) combine logic and probability by attaching weights to first-order clauses, and viewing these as templates for features of Markov networks. In this pap...
Stanley Kok, Pedro Domingos
KDD
2008
ACM
274views Data Mining» more  KDD 2008»
14 years 9 months ago
Data mining using high performance data clouds: experimental studies using sector and sphere
We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastruc...
Robert L. Grossman, Yunhong Gu
KBSE
2009
IEEE
14 years 4 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
ICALT
2008
IEEE
14 years 3 months ago
NUCLEO: Adaptive Computer Supported Collaborative Learning in a Role Game Based Scenario
This paper presents the adaptation model used in NUCLEO, a pilot e-learning environment that is currently being developed at the Complutense University of Madrid. The NUCLEO syste...
Pilar Sancho, Rubén Fuentes-Fernánde...
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 3 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...