Sciweavers

1154 search results - page 135 / 231
» The Degradation of Knowledge Base Integrity
Sort
View
ICEIS
2008
IEEE
14 years 3 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
14 years 3 months ago
Improving distributed service management using Service Modeling Language (SML)
—Automatic service and application deployment and management is becoming possible through the use of service and infrastructure discovery and policy systems. But using the infras...
Robert Adams, Ricardo Rivaldo, Guilherme Germoglio...
IAT
2006
IEEE
14 years 3 months ago
Toward Inductive Logic Programming for Collaborative Problem Solving
In this paper, we tackle learning in distributed systems and the fact that learning does not necessarily involve the participation of agents directly in the inductive process itse...
Jian Huang, Adrian R. Pearce
UIST
1995
ACM
14 years 19 days ago
Multiple-View Approach for Smooth Information Retrieval
Although various visualization techniques have been proposed for information retrieval tasks, most of them are based on a single strategy for viewing and navigating through the in...
Toshiyuki Masui, Mitsuru Minakuchi, George R. Bord...
EDM
2010
113views Data Mining» more  EDM 2010»
13 years 10 months ago
Using multiple Dirichlet distributions to improve parameter plausibility
Predictive accuracy and parameter plausibility are two major desired aspects for a student modeling approach. Knowledge tracing, the most commonly used approach, suffers from local...
Yue Gong, Joseph E. Beck, Neil T. Heffernan