Sciweavers

6652 search results - page 1262 / 1331
» On the effective evaluation of TCP
Sort
View
CSREASAM
2006
13 years 9 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
DLOG
2006
13 years 9 months ago
Tableau Caching for Description Logics with Inverse and Transitive Roles
Abstract. Modern description logic (DL) reasoners are known to be less efficient for DLs with inverse roles. The current loss of performance is largely due to the missing applicabi...
Yu Ding, Volker Haarslev
FLAIRS
2006
13 years 9 months ago
Using Enhanced Concept Map for Student Modeling in Programming Tutors
We have been using the concept map of the domain, enhanced with pedagogical concepts called learning objectives, as the overlay student model in our intelligent tutors for program...
Amruth N. Kumar
FLAIRS
2006
13 years 9 months ago
Fuzzy Model Optimization Using Genetic Algorithm for Aircraft Engine Diagnosis
An accurate and up-to-date diagnostic model is critical for economic aircraft engine operation. However, for many commercial airline fleets, monitoring and diagnosing engine fault...
LiJie Yu, Daniel J. Cleary, Mark D. Osborn, Vrinda...
IWEC
2004
13 years 9 months ago
Development of Extemporaneous Performance by Synthetic Actors in the Rehearsal Process
Autonomous synthetic actors must invent variations of known material in order to perform given only a limited script, and to assist the director with development of the performance...
Tony A. Meyer, Chris H. Messom
« Prev « First page 1262 / 1331 Last » Next »