Sciweavers

4128 search results - page 65 / 826
» Learning and using relational theories
Sort
View
CSREASAM
2006
13 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
14 years 4 months ago
Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, wit...
Fu-ren Lin, Sheng-cheng Lin, Ying-fen Wang
ADCM
2008
136views more  ADCM 2008»
13 years 10 months ago
Learning and approximation by Gaussians on Riemannian manifolds
Learning function relations or understanding structures of data lying in manifolds embedded in huge dimensional Euclidean spaces is an important topic in learning theory. In this ...
Gui-Bo Ye, Ding-Xuan Zhou
ERCIM
2008
130views more  ERCIM 2008»
13 years 10 months ago
Mediated Collaborative Learning
Information and Communication Technologies facilitate the emergence of new contexts and practices of learning that educational institutions have to adapt to their pedagogical disc...
Kostas Pentikousis, Carmen Martinez-Carrillo
IJCAI
1989
13 years 11 months ago
Detecting and Correcting Errors of Omission After Explanation-Based Learning
In this paper, we address an issue that arises when the background knowledge used by explanationbased learning is incorrect. In particular, we consider the problems that can be ca...
Michael J. Pazzani