Sciweavers

10594 search results - page 2069 / 2119
» Learning classifier systems
Sort
View
154
Voted
SENSYS
2010
ACM
15 years 15 days ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
172
Voted
USS
2010
15 years 15 days ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
138
Voted
WEBI
2010
Springer
15 years 14 days ago
Incorporating Seasonality into Search Suggestions Derived from Intranet Query Logs
While much research has been performed on query logs collected for major Web search engines, query log analysis to enhance search on smaller and more focused collections has attrac...
Stephen Dignum, Udo Kruschwitz, Maria Fasli, Yunhy...
240
Voted
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 13 days ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
145
Voted
ALGOSENSORS
2010
Springer
15 years 1 months ago
From Key Predistribution to Key Redistribution
One of crucial disadvantages of key predistribution schemes for ad hoc networks is that if devices A and B use a shared key K to determine their session keys, then any adversarial...
Jacek Cichon, Zbigniew Golebiewski, Miroslaw Kutyl...
« Prev « First page 2069 / 2119 Last » Next »