Sciweavers

2474 search results - page 344 / 495
» Using Knowledge Management Systems to Structure Knowledgeabl...
Sort
View
103
Voted
HICSS
2008
IEEE
119views Biometrics» more  HICSS 2008»
15 years 9 months ago
Tree Mining in Mental Health Domain
The number of mentally ill people is increasing globally each year. Despite major medical advances, the identification of genetic and environmental factors responsible for mental ...
Maja Hadzic, Fedja Hadzic, Tharam S. Dillon
130
Voted
EDM
2008
97views Data Mining» more  EDM 2008»
15 years 4 months ago
Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor
Using data from an existing pre-algebra computer-based tutor, we analyzed the covariance of item-types with the goal of describing a more effective way to assign skill labels to it...
Philip I. Pavlik, Hao Cen, Lili Wu, Kenneth R. Koe...
132
Voted
JECR
2002
120views more  JECR 2002»
15 years 2 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
BMCBI
2007
153views more  BMCBI 2007»
15 years 2 months ago
Estimating genealogies from linked marker data: a Bayesian approach
Background: Answers to several fundamental questions in statistical genetics would ideally require knowledge of the ancestral pedigree and of the gene flow therein. A few examples...
Dario Gasbarra, Matti Pirinen, Mikko J. Sillanp&au...
114
Voted
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...