High false alarm rate and time-space cost of rule extraction and detection limit the application of machine learning in real Intrusion Detection System (IDS), and IDS cannot satisfy most system performance requirement...
详细信息
With the growth of adaptive educational systems available to students, semantic integration of user modeling information from these systems is emerging into an important practical task. Ontologies can serve as the maj...
详细信息
ISBN:
(纸本)9789868473522
With the growth of adaptive educational systems available to students, semantic integration of user modeling information from these systems is emerging into an important practical task. Ontologies can serve as the major representational framework for such integration. In this paper, we report an experiment on integration of domain models of two different adaptive systems. The differences in domain representations require use of manual mappings provided by human experts. The structure of domain ontology helps to refine the resulting mappings and align human expertise.
Our motivation for knowledge discovery in Chinese medicine is two folds: innovate and verify effective data mining technology in realistic applications;and update Chinese medical informatics. This paper focuses on the...
详细信息
This paper examines transformational learning experiences of computing students as a way to better understand threshold concepts in computing. From empirical evidence we found that students often describe transformati...
详细信息
ISBN:
(纸本)9781605582160
This paper examines transformational learning experiences of computing students as a way to better understand threshold concepts in computing. From empirical evidence we found that students often describe transformative experiences as learning situations in which they were led to use various kinds of abstraction, for example modularity, data abstraction, inheritance, polymorphism, reuse, design patterns, and complexity. Some students describe an abstract concept as coming first, and then needing to be made concrete though application;others describe transformations in which they learn the advantages of these abstract concepts from their experience of not using them. Abstraction is certainly of central importance in computerscience. It appears, however, from our students' descriptions of transformative experiences, that abstraction per se is not a threshold, but that particular concepts in which abstraction is paramount exhibit the characteristics of threshold concepts. Copyright 2008 ACM.
Although it is commonly agreed that e-Government systems enhance governance, there is a lack of empirical evidence to build upon this hypothesis which, legitimately, creates reluctance among key decision makers to ado...
详细信息
Although it is commonly agreed that e-Government systems enhance governance, there is a lack of empirical evidence to build upon this hypothesis which, legitimately, creates reluctance among key decision makers to adopt e-Government, especially in local governmental agencies in developing countries, In the context of the e-Fez Project and in a close collaboration with the municipality of the Moroccan city of Fez, we developed a pilot e-Government system that facilitates citizens' access to governmental information and services. In the course of the e-Fez Project and other similar projects, we set up a methodology that emphasizes good governance at each step of an e-Government project and enables us to continuously assess the outcomes of the resulting e-Gov systems on governance. The ultimate goal is to reduce the reluctance of decision makers and to contribute in the dissemination of e-technology in developing countries through a scientific and proven methodology that systematically links eGovernment outcomes to good governance attributes.
Digital broadcasting as new generation broadcasting offers a new opportunity for interactive services. For variety services of broadcasting, the broadcasting metadata becomes increasingly important and one of the meta...
详细信息
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible ...
详细信息
ISBN:
(纸本)9780769531588;9780769534114
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users' locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated acording to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the proposed index structure, we develop a Spatial-Temporal Connective Cloaking algorithm(abbreviated as STCC). A simulator is implemented and extensive experiments are conducted. Experimental results show that our proposed algorithm out-performs prior cloaking algorithms in terms of the candidate query results and the cache utilization.
Cost estimation is a critical issue for software organizations. Good estimates can help us make more informed decisions (controlling and planning software risks), if they are reliable (correct) and valid (stable). In ...
详细信息
We have used neural network water level trend prediction (NNWLTP) in support of a water level sensing project. The NNWLTP approach allows dynamic change in water level sampling frequency, which will reduce power consu...
详细信息
ISBN:
(纸本)9780769532639
We have used neural network water level trend prediction (NNWLTP) in support of a water level sensing project. The NNWLTP approach allows dynamic change in water level sampling frequency, which will reduce power consumption and extend battery life in energy constrained devices. This paper deals primarily with the NNWLTP, which would allow sampling frequency change commands to be transmitted to the sensors when a transition or turning point was detected.
暂无评论