Sciweavers

3651 search results - page 647 / 731
» Data Mining for Security Applications
Sort
View
AIME
2007
Springer
14 years 5 months ago
Hierarchical Latent Class Models and Statistical Foundation for Traditional Chinese Medicine
Traditional Chinese medicine (TCM) is an important avenue for disease prevention and treatment for the Chinese people and is gaining popularity among others. However, many remain s...
Nevin Lianwen Zhang, Shihong Yuan, Tao Chen, Yi Wa...
ECTEL
2007
Springer
14 years 5 months ago
Using MotSaRT to Support On-Line Teachers in Student Motivation
Motivation to learn is affected by a student’s self-efficacy, goal orientation, locus of control and perceived task difficulty. In the classroom, teachers know how to motivate th...
Teresa Hurley, Stephan Weibelzahl
WETICE
2006
IEEE
14 years 5 months ago
Co-Presence Communities: Using Pervasive Computing to Support Weak Social Networks
Although the strongest social relationships feature most prominently in our lives, we also maintain a multitude of much weaker connections: the distant colleagues that we share a ...
Jamie Lawrence, Terry R. Payne, David De Roure
MM
2006
ACM
250views Multimedia» more  MM 2006»
14 years 5 months ago
Effective and efficient object-based image retrieval using visual phrases
In this paper, we draw an analogy between image retrieval and text retrieval and propose a visual phrase-based approach to retrieve images containing desired objects. The visual p...
Qing-Fang Zheng, Wei-Qiang Wang, Wen Gao
CEC
2005
IEEE
14 years 4 months ago
Parallel evolutionary algorithms on graphics processing unit
Evolutionary Algorithms (EAs) are effective and robust methods for solving many practical problems such as feature selection, electrical circuits synthesis, and data mining. Howeve...
Man Leung Wong, Tien-Tsin Wong, Ka-Ling Fok