Sciweavers

424 search results - page 68 / 85
» Integrating Data Mining and Agent Based Modeling and Simulat...
Sort
View
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
14 years 8 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
DMIN
2007
183views Data Mining» more  DMIN 2007»
13 years 9 months ago
Crawling Attacks Against Web-based Recommender Systems
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
Runa Bhaumik, Robin D. Burke, Bamshad Mobasher
BIBE
2005
IEEE
116views Bioinformatics» more  BIBE 2005»
14 years 1 months ago
Stochastic Model of Protease-Ligand Reactions
Prediction of protein tertiary structure based on amino acid sequence is one of the most challenging open questions in computational molecular biology. The two most common experim...
Paul E. Anderson, Douglas W. Raiford, Deacon J. Sw...
PRESENCE
2007
167views more  PRESENCE 2007»
13 years 7 months ago
TimbreFields: 3D Interactive Sound Models for Real-Time Audio
We describe a methodology for Virtual Reality designers to capture and resynthesize the variations in sound made by objects when we interact with them through contact such as touc...
Richard Corbett, Kees van den Doel, John E. Lloyd,...
AHSWN
2006
206views more  AHSWN 2006»
13 years 7 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch