Sciweavers

11814 search results - page 2278 / 2363
» On Generalization by Neural Networks
Sort
View
123
Voted
COCOON
2009
Springer
15 years 10 months ago
Online Tree Node Assignment with Resource Augmentation
Given a complete binary tree of height h, the online tree node assignment problem is to serve a sequence of assignment/release requests, where an assignment request, with an integ...
Joseph Wun-Tat Chan, Francis Y. L. Chin, Hing-Fung...
131
Voted
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 10 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
MHCI
2009
Springer
15 years 10 months ago
Information empowerment through mobile learning
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
130
Voted
NOSSDAV
2009
Springer
15 years 10 months ago
Overlay monitoring and repair in swarm-based peer-to-peer streaming
In Swarm-based Peer-to-Peer Streaming (SPS) mechanisms, participating peers form a randomly connected mesh over which they incorporate swarm-like content delivery. In practice, a ...
Nazanin Magharei, Reza Rejaie
124
Voted
PERSUASIVE
2009
Springer
15 years 10 months ago
A behavior model for persuasive design
This paper presents a new model for understanding human behavior. In this model (FBM), behavior is a product of three factors: motivation, ability, and triggers, each of which has...
B. J. Fogg
« Prev « First page 2278 / 2363 Last » Next »