Sciweavers

6884 search results - page 121 / 1377
» The macro-structure of use of help
Sort
View
EDM
2010
152views Data Mining» more  EDM 2010»
13 years 10 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim
ECIS
2004
13 years 10 months ago
Diffusion of e-procurement in the public sector - revisiting centralization versus decentralization debates as a twist in the ta
Several governments are in the process of implementing e-procurement. In the process they face several challenges. The diffusion of e-procurement in the Danish public sector is re...
Somasundaram Ramanathan
LISA
1998
13 years 10 months ago
mkpkg: A software packaging tool
mkpkg is a tool that helps software publishers create installation packages. Given software that is ready for distribution, mkpkg helps the publisher develop a description of the ...
Carl Staelin
JSW
2008
164views more  JSW 2008»
13 years 9 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
LRE
2008
110views more  LRE 2008»
13 years 9 months ago
Automatic building of an ontology on the basis of text corpora in Thai
This paper presents a methodology for automatic learning of ontologies from Thai text corpora, by extraction of terms and relations. A shallow parser is used to chunk texts on whic...
Aurawan Imsombut, Asanee Kawtrakul