Sciweavers

3628 search results - page 608 / 726
» Approaching the Physical Limits of Computing
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
CIBCB
2005
IEEE
15 years 3 months ago
Feedback Memetic Algorithms for Modeling Gene Regulatory Networks
— In this paper we address the problem of finding gene regulatory networks from experimental DNA microarray data. We focus on the evaluation of the performance of memetic algori...
Christian Spieth, Felix Streichert, Jochen Supper,...
ITRUST
2005
Springer
15 years 3 months ago
Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences
Collaborative Filtering (CF), the prevalent recommendation approach, has been successfully used to identify users that can be characterized as “similar” according to their logg...
Manos Papagelis, Dimitris Plexousakis, Themistokli...
93
Voted
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 3 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
EUSAI
2004
Springer
15 years 3 months ago
Integrating Handhelds into Environments of Cooperating Smart Everyday Objects
Because of their severe resource-restrictions and limited user interfaces, smart everyday objects must often rely on remote resources to realize their services. This paper shows ho...
Frank Siegemund, Tobias Krauer