Sciweavers

3907 search results - page 660 / 782
» Time, Knowledge, and Choice
Sort
View
ESWA
2006
123views more  ESWA 2006»
13 years 9 months ago
Design of a RFID case-based resource management system for warehouse operations
In the past, the selection of resources to execute various warehouse operation services was done solely by experts. In this paper, a RFIDbased Resource Management System (RFID-RMS...
Harry K. H. Chow, King Lun Choy, W. B. Lee, K. C. ...
IJMMS
2008
153views more  IJMMS 2008»
13 years 9 months ago
Physiology-based affect recognition for computer-assisted intervention of children with Autism Spectrum Disorder
Generally, an experienced therapist continuously monitors the affective cues of the children with Autism Spectrum Disorders (ASD) and adjusts the course of the intervention accord...
Changchun Liu, Karla Conn, Nilanjan Sarkar, Wendy ...
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
13 years 9 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
CLEIEJ
2007
152views more  CLEIEJ 2007»
13 years 9 months ago
Gene Expression Analysis using Markov Chains extracted from RNNs
Abstract. This paper present a new approach for the analysis of gene expression, by extracting a Markov Chain from trained Recurrent Neural Networks (RNNs). A lot of microarray dat...
Igor Lorenzato Almeida, Denise Regina Pechmann Sim...
ISCI
2008
86views more  ISCI 2008»
13 years 9 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...