Sciweavers

811 search results - page 133 / 163
» When Novelty Is Not Enough
Sort
View
EDBT
2010
ACM
237views Database» more  EDBT 2010»
14 years 3 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
CSIE
2009
IEEE
14 years 3 months ago
Identifying DNA Strands Using a Kernel of Classified Sequences
— Automated DNA sequencing produces a large amount of raw DNA sequence data that then needs to be classified, organized, and annotation. One major application is the comparison o...
Guillermo Tonsmann, David D. Pollock, Wanjun Gu, T...
ICIW
2009
IEEE
14 years 3 months ago
Paircoding: Improving File Sharing Using Sparse Network Codes
BitTorrent and Practical Network Coding are efficient methods for sharing files in a peer-to-peer network. Both face the problem to distribute a given file using peers with dif...
Christian Ortolf, Christian Schindelhauer, Arne Va...
AIED
2009
Springer
14 years 3 months ago
Scaffolding Motivation and Metacognition in Learning Programming
This paper explores the role that feedback based on past actions and motivational states of the learner can have in a motivationally and metacognitively aware Intelligent Tutoring ...
Alison Hull, Benedict du Boulay
WINE
2009
Springer
127views Economy» more  WINE 2009»
14 years 3 months ago
Nash Dynamics in Congestion Games with Similar Resources
We study convergence of ε-Nash dynamics in congestion games when delay functions of all resources are similar. Delay functions are said to be similar if their values are within a...
Anand Bhalgat, Tanmoy Chakraborty, Sanjeev Khanna