Sciweavers

3272 search results - page 508 / 655
» Privacy in Data Publishing
Sort
View
CORR
2006
Springer
93views Education» more  CORR 2006»
13 years 9 months ago
Functional dissipation microarrays for classification
In this article, we describe a new method of extracting information from signals, called functional dissipation, that proves to be very effective for enhancing classification of h...
D. Napoletani, Daniele C. Struppa, T. Sauer, V. Mo...
DSS
2006
170views more  DSS 2006»
13 years 9 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
IIE
2008
123views more  IIE 2008»
13 years 9 months ago
A Methodological Review of the Program Evaluations in K-12 Computer Science Education
Because of the potential for methodological reviews to improve practice, this article presents the results of a methodological review, and meta-analysis, of kindergarten through 12...
Justus J. Randolph
CLASSIFICATION
2007
105views more  CLASSIFICATION 2007»
13 years 9 months ago
Bayesian Regularization for Normal Mixture Estimation and Model-Based Clustering
Normal mixture models are widely used for statistical modeling of data, including cluster analysis. However maximum likelihood estimation (MLE) for normal mixtures using the EM al...
Chris Fraley, Adrian E. Raftery
IJISEC
2006
113views more  IJISEC 2006»
13 years 9 months ago
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing , there has been a great deal of interest in cryptographic primitiv...
Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Sma...