Sciweavers

1558 search results - page 300 / 312
» Effective Analysis and Design of Computer-Supported Learning...
Sort
View
ICDCS
2010
IEEE
14 years 7 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
WWW
2005
ACM
15 years 10 months ago
Improving recommendation lists through topic diversification
In this work we present topic diversification, a novel method designed to balance and diversify personalized recommendation lists in order to reflect the user's complete spec...
Cai-Nicolas Ziegler, Sean M. McNee, Joseph A. Kons...
WWW
2004
ACM
15 years 10 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
78
Voted
BMCBI
2006
92views more  BMCBI 2006»
14 years 9 months ago
Demonstration of two novel methods for predicting functional siRNA efficiency
Background: siRNAs are small RNAs that serve as sequence determinants during the gene silencing process called RNA interference (RNAi). It is well know that siRNA efficiency is cr...
Peilin Jia, Tieliu Shi, Yu-Dong Cai, Yixue Li
MOBIHOC
2008
ACM
15 years 9 months ago
The networking shape of vehicular mobility
Mobility is the distinguishing feature of vehicular networks, affecting the evolution of network connectivity over space and time in a unique way. Connectivity dynamics, in turn, ...
Marco Fiore, Jérôme Härri