In view of students' individual difference in the learning process, in this paper we propose a personalized learning system, to which intelligent Agent technique and case-bas...
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
MINING biological data is an emerging area of intersection between data mining and bioinformatics. Bio-informaticians have been working on the research and development of computat...
In the recent decades the importance of the information systems (IS) has been steadily growing. Nowadays most of the operations that imply complex manipulations with data and stor...
The paper discusses the innovative patterns such as subtraction, multiplication, division, task unification and attribute dependency change for evaluating the software architectur...