Sciweavers

1082 search results - page 187 / 217
» User Modeling in Adaptive Hypermedia Educational Systems
Sort
View
FGCS
2007
125views more  FGCS 2007»
13 years 8 months ago
An autonomic tool for building self-organizing Grid-enabled applications
In this paper we present CAMELotGrid, a tool to manage Grid computations of Cellular Automata that support the efficient simulation of complex systems modeled by a very large numb...
Gianluigi Folino, Giandomenico Spezzano
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
14 years 2 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
EUSFLAT
2009
312views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Forecasting Exchange Rates: A Neuro-Fuzzy Approach
This paper presents an adaptive neuro-fuzzy inference system (ANFIS) for USD/JPY exchange rates forecasting. Previous work often used time series techniques and neural networks (NN...
Meysam Alizadeh, Roy Rada, Akram Khaleghei Ghoshe ...
ATAL
2008
Springer
13 years 10 months ago
An approach to online optimization of heuristic coordination algorithms
Due to computational intractability, large scale coordination algorithms are necessarily heuristic and hence require tuning for particular environments. In domains where character...
Jumpol Polvichai, Paul Scerri, Michael Lewis
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs