Sciweavers

521 search results - page 10 / 105
» Widening the Evaluation Net
Sort
View
EDM
2008
121views Data Mining» more  EDM 2008»
13 years 9 months ago
Analytic Comparison of Three Methods to Evaluate Tutorial Behaviors
We compare the purposes, inputs, representations, and assumptions of three methods to evaluate the fine-grained interactions of intelligent tutors with their students. One method i...
Jack Mostow, Xiaonan Zhang
SAC
2005
ACM
14 years 1 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
ICOIN
2005
Springer
14 years 1 months ago
A Rerouting Scheme with Dynamic Control of Restoration Scope for Survivable MPLS Network
This paper proposes a rerouting scheme that can be applied to the restoration of working Label Switched Paths (LSPs) and preprovisioned backup LSPs, which consists of two subsequen...
Daniel Won-Kyu Hong, Choong Seon Hong
PARLE
1994
13 years 11 months ago
Using Reference Counters in Update-Based Coherent Memory
Abstract. As the disparity between processor and memory speed continues to widen, the exploitation of locality of reference in shared-memory multiprocessors becomes an increasingly...
Evangelos P. Markatos, Catherine E. Chronaki