Sciweavers

7741 search results - page 1445 / 1549
» Security in Active Networks
Sort
View
CORR
2002
Springer
89views Education» more  CORR 2002»
15 years 4 months ago
NetNeg: A Connectionist-Agent Integrated System for Representing Musical Knowledge
Thesystempresented here showsthe feasibility of modcling the knowledgeinvolved in a complexmusical activity by integrating sub-symbolicand symbolicprocesses. Thisresearch focuses ...
Claudia V. Goldman, Dan Gang, Jeffrey S. Rosensche...
DPD
2002
125views more  DPD 2002»
15 years 4 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
ISCI
2002
132views more  ISCI 2002»
15 years 4 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
PUC
2002
143views more  PUC 2002»
15 years 4 months ago
TRIP: A Low-Cost Vision-Based Location System for Ubiquitous Computing
: Sentient Computing provides computers with perception so that they can react and provide assistance to user activities. Physical spaces are made sentient when they are wired with...
Diego López de Ipiña, Paulo R. S. Me...
KES
2007
Springer
15 years 3 months ago
Creating Chances Through Cognitive Niche Construction
Abstract As a matter of fact, humans continuously delegate and distribute cognitive functions to the environment to lessen their limits. They build models, representations, and oth...
Lorenzo Magnani
« Prev « First page 1445 / 1549 Last » Next »