Sciweavers

536 search results - page 15 / 108
» paste 2010
Sort
View
JAISE
2010
88views Algorithms» more  JAISE 2010»
13 years 3 months ago
Improving user verification by implementing an agent-based security system
Abstract. This paper presents an agent-based, high-level security system for user verification. The system verifies a user's identity by processing data from several low-lever...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
UM
2010
Springer
14 years 1 months ago
Bayesian Credibility Modeling for Personalized Recommendation in Participatory Media
In this paper, we focus on the challenge that users face in processing messages on the web posted in participatory media settings, such as blogs. It is desirable to recommend to us...
Aaditeshwar Seth, Jie Zhang, Robin Cohen
RECOMB
2010
Springer
14 years 3 months ago
On the Genealogy of Asexual Diploids
Given molecular genetic data from diploid individuals that, at present, reproduce mostly or exclusively asexually without recombination, an important problem in evolutionary biolog...
Fumei Lam, Charles H. Langley, Yun S. Song
COLING
2010
13 years 3 months ago
Bridging Topic Modeling and Personalized Search
This work presents a study to bridge topic modeling and personalized search. A probabilistic topic model is used to extract topics from user search history. These topics can be se...
Wei Song, Yu Zhang, Ting Liu, Sheng Li
SIMPRA
2010
95views more  SIMPRA 2010»
13 years 7 months ago
State-dependent stochastic mobility model in mobile communication networks
Abstract — We apply finite state-dependent queueing networks to model mobility in mobile communication systems. Although they have been successfully used in the past to model ve...
Frederico R. B. Cruz, P. C. Oliveira, Luiz Duczmal