Sciweavers

268 search results - page 11 / 54
» Locating Hidden Groups in Communication Networks Using Hidde...
Sort
View
IDEAL
2004
Springer
14 years 1 months ago
Stock Trading by Modelling Price Trend with Dynamic Bayesian Networks
We study a stock trading method based on dynamic bayesian networks to model the dynamics of the trend of stock prices. We design a three level hierarchical hidden Markov model (HHM...
Jangmin O, Jae Won Lee, Sung-Bae Park, Byoung-Tak ...
IDEAL
2005
Springer
14 years 1 months ago
Predictive Vaccinology: Optimisation of Predictions Using Support Vector Machine Classifiers
Promiscuous human leukocyte antigen (HLA) binding peptides are ideal targets for vaccine development. Existing computational models for prediction of promiscuous peptides used hidd...
Ivana Bozic, Guanglan Zhang, Vladimir Brusic
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 2 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
ASIAMS
2009
IEEE
13 years 8 months ago
Uncovering Hidden Information Within University's Student Enrollment Data Using Data Mining
To date, higher educational organizations are placed in a very high competitive environment. To remain competitive, one approach is to tackle the student and administration challen...
Fadzilah Siraj, Mansour Ali Abdoulha
NETWORKING
2004
13 years 9 months ago
Modeling the Short-Term Unfairness of IEEE 802.11 in Presence of Hidden Terminals
: IEEE 802.11 exhibits both short-term and long-term unfairness [15]. The short-term fairness automatically gives rise to long-term fairness, but not vice versa [11]. When we thoro...
Zhifei Li, Sukumar Nandi, Anil K. Gupta