Sciweavers

784 search results - page 155 / 157
» Personalizing access to learning networks
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 8 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
IEEECIT
2010
IEEE
13 years 6 months ago
The Curriculum Reform of Database System Principle Based on Paperless Examination Platform
—Database technology is the significant part of computer science and technology, as the core technology of information management, database technology is widely used in the field...
Haifeng Ke, Gaoyan Zhang, Minghui Wu
PERCOM
2003
ACM
14 years 7 months ago
Location Aware Resource Management in Smart Homes
Abstract-- The rapid advances in a wide range of wireless access technologies along with the efficient use of smart spaces have already set the stage for development of smart homes...
Abhishek Roy, Soumya K. Das Bhaumik, Amiya Bhattac...
MSS
2000
IEEE
119views Hardware» more  MSS 2000»
13 years 12 months ago
Implementing Journaling in a Linux Shared Disk File System
In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channe...
Kenneth W. Preslan, Andrew P. Barry, Jonathan Bras...
PERCOM
2010
ACM
13 years 6 months ago
The co-evolution of taxi drivers and their in-car navigation systems
In the recent years, the massive use of in-car navigation systems has symbolized the emergence of location-based services for wayfinding. This market success creates the opportunit...
Fabien Girardin, Josep Blat