Sciweavers

1101 search results - page 140 / 221
» heuristics 2007
Sort
View
ACTA
2006
104views more  ACTA 2006»
13 years 10 months ago
Safe projections of binary data sets
Abstract Selectivity estimation of a boolean query based on frequent itemsets can be solved by describing the problem by a linear program. However, the number of variables in the e...
Nikolaj Tatti
AIEDU
2006
77views more  AIEDU 2006»
13 years 10 months ago
Constraint-based Modeling and Ambiguity
Constraint-based modeling has been used in many application areas of Intelligent Tutoring Systems as a powerful means to analyse erroneous student solutions and generate helpful fe...
Wolfgang Menzel
AUTOMATICA
2006
101views more  AUTOMATICA 2006»
13 years 10 months ago
A risk-sensitive approach to total productive maintenance
While risk-sensitive (RS) approaches for designing plans of total productive maintenance are critical in manufacturing systems, there is little in the literature by way of theoret...
Abhijit Gosavi
BMCBI
2006
112views more  BMCBI 2006»
13 years 10 months ago
Argument-predicate distance as a filter for enhancing precision in extracting predications on the genetic etiology of disease
Background: Genomic functional information is valuable for biomedical research. However, such information frequently needs to be extracted from the scientific literature and struc...
Marco Masseroli, Halil Kilicoglu, François-...
CN
2007
106views more  CN 2007»
13 years 10 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...