Sciweavers

7720 search results - page 1446 / 1544
» A Model for Interface Groups
Sort
View
CATE
2004
190views Education» more  CATE 2004»
13 years 9 months ago
Enhancing Online Learning Performance: An Application of Data Mining Methods
Recently web-based educational systems collect vast amounts of data on user patterns, and data mining methods can be applied to these databases to discover interesting associations...
Behrouz Minaei-Bidgoli, Gerd Kortemeyer, William F...
CMS
2003
171views Communications» more  CMS 2003»
13 years 9 months ago
Securing the Border Gateway Protocol: A Status Update
The Border Gateway Protocol (BGP) is a critical component of the Internet routing infrastructure, used to distribute routing information between autonomous systems (ASes). It is hi...
Stephen T. Kent
CSREASAM
2003
13 years 9 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
ERSA
2003
137views Hardware» more  ERSA 2003»
13 years 9 months ago
Next Generation Architecture for Heterogeneous Embedded Systems
The Software Communications Architecture (SCA), a mandatory specification for Software Radio implementations by the Joint Tactical Radio System (JTRS), defines a Common Object R...
S. Murat Bicer, Frank Pilhofer, Graham Bardouleau,...
MOBICOM
2010
ACM
13 years 8 months ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...
« Prev « First page 1446 / 1544 Last » Next »