Sciweavers

933 search results - page 144 / 187
» Sharing User Models for Adaptive Hypermedia Applications
Sort
View
TMC
2008
152views more  TMC 2008»
15 years 4 months ago
Improving TCP/IP Performance over Third-Generation Wireless Networks
As third generation (3G) wireless networks with high data rate get widely deployed, optimizing TCP performance over these networks would have a broad and significant impact on data...
Mun Choon Chan, Ramachandran Ramjee
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
15 years 10 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
16 years 5 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
MM
2003
ACM
125views Multimedia» more  MM 2003»
15 years 10 months ago
Automatic browsing of large pictures on mobile devices
Pictures have become increasingly common and popular in mobile communications. However, due to the limitation of mobile devices, there is a need to develop new technologies to fac...
Hao Liu, Xing Xie, Wei-Ying Ma, HongJiang Zhang
CW
2003
IEEE
15 years 10 months ago
MASCARET: Pedagogical Multi-Agents System for Virtual Environment for Training
This study concerns virtual environments for training in operational conditions. The principal developed idea is that these environments are heterogeneous and open multi-agent sys...
Cedric Buche, Ronan Querrec, Pierre De Loor, Pierr...