Sciweavers

5615 search results - page 1023 / 1123
» Active Learner Modelling
Sort
View
145
Voted
IDEAL
2010
Springer
15 years 1 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
PIMRC
2010
IEEE
15 years 1 months ago
Opportunistic channel access scheme for cognitive radio system based on residual white space distribution
We propose an opportunistic channel access scheme for cognitive radio-enabled secondary networks. In our work, we model the channel occupancy due to Primary User (PU) activity as a...
Manuj Sharma, Anirudha Sahoo
92
Voted
CORR
2009
Springer
106views Education» more  CORR 2009»
15 years 1 months ago
A framework for protein and membrane interactions
dels at different abstraction levels; in particular, higher-level (e.g. membrane) activities can be given a formal biological justification in terms of low-level (i.e., protein) in...
Giorgio Bacci, Davide Grohmann, Marino Miculan
173
Voted
DLS
2009
182views Languages» more  DLS 2009»
15 years 1 months ago
Context-oriented software transactional memory in common lisp
Software transactional memory (STM) is a promising approach for coordinating concurrent threads, for which many implementation strategies are currently being researched. Although ...
Pascal Costanza, Charlotte Herzeel, Theo D'Hondt
ICMLA
2009
15 years 1 months ago
Discovering Rules from Disk Events for Predicting Hard Drive Failures
Detecting impending failure of hard disks is an important prediction task which might help computer systems to prevent loss of data and performance degradation. Currently most of t...
Vipul Agarwal, Chiranjib Bhattacharyya, Thirumale ...
« Prev « First page 1023 / 1123 Last » Next »