Sciweavers

2435 search results - page 186 / 487
» Intellexer Question Answering
Sort
View
142
Voted
ATAL
2007
Springer
15 years 10 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
UM
2007
Springer
15 years 10 months ago
The Effect of Model Granularity on Student Performance Prediction Using Bayesian Networks
A standing question in the field of Intelligent Tutoring Systems and User Modeling in general is what is the appropriate level of model granularity (how many skills to model) and h...
Zachary A. Pardos, Neil T. Heffernan, Brigham Ande...
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
15 years 9 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
ATAL
2003
Springer
15 years 9 months ago
Capturing agent autonomy in roles and XML
A key question in the field of agent-oriented software engineering is how the kind and extent of autonomy owned by computational agents can be appropriately captured. As long as ...
Gerhard Weiß, Michael Rovatsos, Matthias Nic...
ECTEL
2006
Springer
15 years 6 months ago
A Method for Capitalizing upon and Synthesizing Analyses of Human Interactions
It is often the case that analyses of human interactive activity are lost once an article is written about the results obtained. Although it is clear that corpora are gathered in o...
Annie Corbel, Jean-Jacques Girardot, Kristine Lund