Sciweavers

5615 search results - page 917 / 1123
» Active Learner Modelling
Sort
View
ASIACRYPT
2007
Springer
15 years 8 months ago
Simple and Efficient Perfectly-Secure Asynchronous MPC
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversa...
Zuzana Beerliová-Trubíniová, ...
CSE
2009
IEEE
15 years 8 months ago
Churn Prediction in MMORPGs: A Social Influence Based Approach
Massively Multiplayer Online Role Playing Games (MMORPGs) are computer based games in which players interact with one another in the virtual world. Worldwide revenues for MMORPGs h...
Jaya Kawale, Aditya Pal, Jaideep Srivastava
ATAL
2006
Springer
15 years 7 months ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
WSC
1998
15 years 5 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
BMCBI
2005
104views more  BMCBI 2005»
15 years 4 months ago
A statistical approach for array CGH data analysis
Background: Microarray-CGH experiments are used to detect and map chromosomal imbalances, by hybridizing targets of genomic DNA from a test and a reference sample to sequences imm...
Franck Picard, Stéphane Robin, Marc Laviell...