Sciweavers

6885 search results - page 1345 / 1377
» The micro-structure of use of help
Sort
View
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
13 years 9 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
AAAI
2006
13 years 9 months ago
Multimodal Cognitive Architecture: Making Perception More Central to Intelligent Behavior
I propose that the notion of cognitive state be broadened from the current predicate-symbolic, Language-of-Thought framework to a multi-modal one, where perception and kinesthetic...
B. Chandrasekaran
AAAI
2004
13 years 9 months ago
Text Classification by Labeling Words
Traditionally, text classifiers are built from labeled training examples. Labeling is usually done manually by human experts (or the users), which is a labor intensive and time co...
Bing Liu, Xiaoli Li, Wee Sun Lee, Philip S. Yu
AAAI
2004
13 years 9 months ago
Mobile Emergency Triage Support System
We are designing and developing a mobile clinical decision support system, known as MET (Mobile Emergency Triage), for supporting emergency triage of different types of acute pain...
Wojtek Michalowski, Roman Slowinski, Szymon Wilk
ECIS
2004
13 years 9 months ago
Leveraging Theoretical Pluralism in qualitative IS research: The example of IS professionals' identity as a complex phenomenon
As Information Systems (IS) research increasingly acknowledges the importance of non-positivist approaches, the case for a plurality of theories to guide qualitative studies has g...
Jo-Ann Siregar, Michael T. K. Tan
« Prev « First page 1345 / 1377 Last » Next »