Sciweavers

2168 search results - page 290 / 434
» IT Predictions for 2008
Sort
View
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 12 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
EDM
2008
96views Data Mining» more  EDM 2008»
13 years 12 months ago
Labeling Student Behavior Faster and More Precisely with Text Replays
We present text replays, a method for generating labels that can be used to train classifiers of student behavior. We use this method to label data as to whether students are gamin...
Ryan Shaun Joazeiro de Baker, Adriana M. J. B. de ...
EMNLP
2008
13 years 12 months ago
Improving Interactive Machine Translation via Mouse Actions
Although Machine Translation (MT) is a very active research field which is receiving an increasing amount of attention from the research community, the results that current MT sys...
Germán Sanchis-Trilles, Daniel Ortiz-Mart&i...
FOIS
2008
13 years 12 months ago
On the Syntax and Semantics of Effect Axioms
Effect axioms constitute the cornerstone of formal theories of action in AI. They drive standard reasoning tasks, especially prediction. These tasks need not be coupled with actual...
Haythem O. Ismail
FOIS
2008
13 years 12 months ago
Introducing Realist Ontology for the Representation of Adverse Events
The goal of the REMINE project is to build a high performance prediction, detection and monitoring platform for managing Risks against Patient Safety (RAPS). Part of the work invol...
Werner Ceusters, Maria Capolupo, Georges De Moor, ...