Sciweavers

512 search results - page 102 / 103
» Explorative Data Mining on Stock Data - Experimental Results...
Sort
View
DEBS
2009
ACM
13 years 10 months ago
Towards efficient event aggregation in a decentralized publish-subscribe system
Recently, decentralized publish-subscribe (pub-sub) systems have gained popularity as a scalable asynchronous messaging paradigm over wide-area networks. Most existing pub-sub sys...
Jianxia Chen, Lakshmish Ramaswamy, David Lowenthal
BMCBI
2007
186views more  BMCBI 2007»
13 years 8 months ago
Modeling human cancer-related regulatory modules by GA-RNN hybrid algorithms
Background: Modeling cancer-related regulatory modules from gene expression profiling of cancer tissues is expected to contribute to our understanding of cancer biology as well as...
Jung-Hsien Chiang, Shih-Yi Chao
ISF
2008
210views more  ISF 2008»
13 years 8 months ago
Affective e-Learning in residential and pervasive computing environments
This article examines how emerging pervasive computing and affective computing technologies might enhance the adoption of ICT in e-Learning which takes place in the home and wider ...
Liping Shen, Victor Callaghan, Ruimin Shen
IJDE
2006
95views more  IJDE 2006»
13 years 8 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum
ISF
2006
118views more  ISF 2006»
13 years 8 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang