Sciweavers

1818 search results - page 312 / 364
» How users use access control
Sort
View
AICT
2006
IEEE
135views Communications» more  AICT 2006»
14 years 25 days ago
Improving Web Performance through New Networking Technologies
New connection-oriented networking technologies can provide quality-of-service guaranteed network connectivity required by some web-based applications. In this paper, we present a...
Xiuduan Fang, Xuan Zheng, Malathi Veeraraghavan
AUSDM
2006
Springer
118views Data Mining» more  AUSDM 2006»
14 years 24 days ago
Efficiently Identifying Exploratory Rules' Significance
How to efficiently discard potentially uninteresting rules in exploratory rule discovery is one of the important research foci in data mining. Many researchers have presented algor...
Shiying Huang, Geoffrey I. Webb
DOCENG
2008
ACM
13 years 11 months ago
Towards Brazilian Portuguese automatic text simplification systems
In this paper we investigate the main linguistic phenomena that can make texts complex and how they could be simplified. We focus on a corpus analysis of simple account texts avai...
Sandra M. Aluísio, Lucia Specia, Thiago Ale...
ESANN
2008
13 years 10 months ago
Automatic alignment of medical vs. general terminologies
We propose an original automatic alignment of definitions taken from different dictionaries that could be associated to the same concept although they may have different labels. Th...
Laura Diosan, Alexandrina Rogozan, Jean-Pierre P&e...
AAAI
2006
13 years 10 months ago
Real-Time Evolution of Neural Networks in the NERO Video Game
A major goal for AI is to allow users to interact with agents that learn in real time, making new kinds of interactive simulations, training applications, and digital entertainmen...
Kenneth O. Stanley, Bobby D. Bryant, Igor Karpov, ...