Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
The aim of the project we discuss in this paper is to develop a computational model of peer learning. We present an extensive analysis of peer learning dialogues, analysis on which...
Cynthia Kersey, Barbara Di Eugenio, Pamela W. Jord...
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
Since design is a process in which designers use various kinds of knowledge and it is an open-ended problem, it is difficult to prepare all necessary knowledge before design. Also...
Globalisation and competitive pressure urge many organisations to radically change business processes. Although this approach can provide significant benefits such as reducing cos...