Sciweavers

JUCS
2010
186views more  JUCS 2010»
13 years 3 months ago
Context Awareness for Collaborative Learning with Uncertainty Management
: In Collaborative Learning, groups of students work together using traditional and computer-based tools or applications. Participants are continuously moving and reorganizing in g...
Roc Messeguer, Leandro Navarro, Pedro Damiá...
JITECH
2010
117views more  JITECH 2010»
13 years 3 months ago
Understanding information disclosure behaviour in Australian Facebook users
The advent of social networking websites presents further opportunities for criminals to obtain information for use in identity theft, cyber-stalking, and worse activities. This p...
William Newk-Fon Hey Tow, Peter Dell, John Venable
TIT
2008
105views more  TIT 2008»
13 years 3 months ago
State Discrimination With Post-Measurement Information
We introduce a new state discrimination problem in which we are given additional information about the state after the measurement, or more generally, after a quantum memory bound ...
Manuel A. Ballester, Stephanie Wehner, Andreas Win...
JCNS
2010
81views more  JCNS 2010»
13 years 3 months ago
Sensory information in local field potentials and spikes from visual and auditory cortices: time scales and frequency bands
Studies analyzing sensory cortical processing or trying to decode brain activity often rely on a combination of different electrophysiological signals, such as local field potentia...
Andrei Belitski, Stefano Panzeri, Cesare Magri, Ni...
IJPRAI
2010
151views more  IJPRAI 2010»
13 years 3 months ago
Structure-Embedded AUC-SVM
: AUC-SVM directly maximizes the area under the ROC curve (AUC) through minimizing its hinge loss relaxation, and the decision function is determined by those support vector sample...
Yunyun Wang, Songcan Chen, Hui Xue
IIR
2010
13 years 3 months ago
GrOnto: A Granular Ontology for Diversifying Search Results
Results diversification is an approach used in literature to cover the possible interpretations of the results produced by query evaluation. For diversifying search results we pr...
Silvia Calegari, Gabriella Pasi
IEEESP
2010
126views more  IEEESP 2010»
13 years 3 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
IEEECIT
2010
IEEE
13 years 3 months ago
A P2P REcommender System based on Gossip Overlays (PREGO)
—Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building an...
Matteo Mordacchini, Ranieri Baraglia, Patrizio Daz...
IDT
2010
125views more  IDT 2010»
13 years 3 months ago
Automatic fusion of knowledge stored in ontologies
A person adds new knowledge to his/her mind, taking into account new information, additional details, better precision, synonyms, homonyms, redundancies, apparent contradictions, a...
Alma-Delia Cuevas, Adolfo Guzmán-Arenas
ICASSP
2010
IEEE
13 years 3 months ago
Random attributed graphs for statistical inference from content and context
Coping with Information Overload is a major challenge of the 21st century. Huge volumes and varieties of multilingual data must be processed to extract salient information. Previo...
Allen L. Gorin, Carey E. Priebe, John Grothendieck