Sciweavers

784 search results - page 15 / 157
» Personalizing access to learning networks
Sort
View
ICML
1997
IEEE
14 years 8 months ago
Predicting Multiprocessor Memory Access Patterns with Learning Models
Machine learning techniques are applicable to computer system optimization. We show that shared memory multiprocessors can successfully utilize machine learning algorithms for mem...
M. F. Sakr, Steven P. Levitan, Donald M. Chiarulli...
IADIS
2008
13 years 9 months ago
Empowering Students With Ict Competences
The aim of this paper is to analyze the continuous learning process from the Open Distance Learning Department of the University of Bucharest. We will underline the personal prolu...
Dumitrache Anisoara, Logofatu Bogdan, Gheorghe Mih...
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
14 years 8 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon
ADHOCNOW
2004
Springer
14 years 1 months ago
Session-Based Service Discovery and Access Control in Peer-to-Peer Communications
Abstract. Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP netwo...
Anand Dersingh, Ramiro Liscano, Allan G. Jost, Hao...
NETWORKING
2004
13 years 9 months ago
Detecting and Blocking Unauthorized Access in Wi-Fi Networks
Abstract. Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but p...
Haidong Xia, José Carlos Brustoloni