Sciweavers

18429 search results - page 3646 / 3686
» Typing dynamic typing
Sort
View
IEEEVAST
2010
14 years 10 months ago
Comparing different levels of interaction constraints for deriving visual problem isomorphs
Interaction and manual manipulation have been shown in the cognitive science literature to play a critical role in problem solving. Given different types of interactions or constr...
Wenwen Dou, Caroline Ziemkiewicz, Lane Harrison, D...
IJAHUC
2010
145views more  IJAHUC 2010»
14 years 10 months ago
Towards a routing framework in ad hoc space networks
Abstract: The unique characteristics of space networks lead to different research approaches from those in terrestrial networks. In this paper, a routing framework called Space Gat...
Chao Chen, Zesheng Chen
148
Voted
ITIIS
2010
138views more  ITIIS 2010»
14 years 10 months ago
Identification of Fuzzy Inference System Based on Information Granulation
In this study, we propose a space search algorithm (SSA) and then introduce a hybrid optimization of fuzzy inference systems based on SSA and information granulation (IG). In comp...
Wei Huang, Lixin Ding, Sung-Kwun Oh, Chang-Won Jeo...
JACM
2010
120views more  JACM 2010»
14 years 10 months ago
The structure of inverses in schema mappings
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Alan Nash
174
Voted
JAIR
2010
181views more  JAIR 2010»
14 years 10 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
« Prev « First page 3646 / 3686 Last » Next »