Sciweavers

2217 search results - page 174 / 444
» Learning from Collective Behavior
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Completeness of the Authentication Tests
Protocol participants manipulate values, transforming the cryptographic contexts in which they occur. The rules of the protocol determine which transformations are permitted. We fo...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
DATE
2006
IEEE
93views Hardware» more  DATE 2006»
14 years 4 months ago
Software annotations for power optimization on mobile devices
Modern applications for mobile devices, such as multimedia video/audio, often exhibit a common behavior: they process streams of incoming data in a regular, predictable way. The r...
Radu Cornea, Alexandru Nicolau, Nikil D. Dutt
WECWIS
2002
IEEE
131views ECommerce» more  WECWIS 2002»
14 years 3 months ago
Mining Client-Side Activity for Personalization
“Garbage in. garbage out” is a well-known phrase in computer analysis, and one that comes to mind when mining Web data to draw conclusions about Web users. The challenge is th...
Kurt D. Fenstermacher, Mark Ginsburg
BMCBI
2010
176views more  BMCBI 2010»
13 years 10 months ago
Reverse engineering gene regulatory network from microarray data using linear time-variant model
nd: Gene regulatory network is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. Such prediction capability...
Mitra Kabir, Nasimul Noman, Hitoshi Iba
MC
2003
157views Computer Science» more  MC 2003»
13 years 11 months ago
From Adaptive Hypermedia to the Adaptive Web
Web systems suffer from an inability to satisfy heterogeneous needs of many users. A remedy for the negative effects of the traditional "one-size-fits-all'' approac...
Peter Brusilovsky