Sciweavers

863 search results - page 36 / 173
» Computational Methods for Intelligent Information Access
Sort
View
ICDCSW
2002
IEEE
15 years 4 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ITCC
2005
IEEE
15 years 5 months ago
Real Stock Trading Using Soft Computing Models
The main focus of this study is to compare different performances of soft computing paradigms for predicting the direction of individuals stocks. Three different artificial intell...
Brent Doeksen, Ajith Abraham, Johnson P. Thomas, M...
SIGCSE
2006
ACM
188views Education» more  SIGCSE 2006»
15 years 5 months ago
A data mining course for computer science: primary sources and implementations
An undergraduate elective course in data mining provides a strong opportunity for students to learn research skills, practice data structures, and enhance their understanding of a...
David R. Musicant
HAIS
2010
Springer
14 years 10 months ago
Reducing Dimensionality in Multiple Instance Learning with a Filter Method
In this article, we describe a feature selection algorithm which can automatically find relevant features for multiple instance learning. Multiple instance learning is considered a...
Amelia Zafra, Mykola Pechenizkiy, Sebastián...
AP2PC
2005
Springer
15 years 5 months ago
ACP2P: Agent-Community-based Peer-to-Peer Information Retrieval - an Evaluation
Abstract. The Agent-Community-based Peer-to-Peer Information Retrieval (ACP2P) method[1],[2] uses agent communities to manage and look up information of interest tousers. An agent ...
Tsunenori Mine, Akihiro Kogo, Makoto Amamiya