Sciweavers

1415 search results - page 260 / 283
» List making in the home
Sort
View
CORR
2008
Springer
152views Education» more  CORR 2008»
14 years 12 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
CORR
2008
Springer
105views Education» more  CORR 2008»
14 years 12 months ago
Success Exponent of Wiretapper: A Tradeoff between Secrecy and Reliability
Equivocation has been widely used as a measure of security after Shannon[10]. For an infinite system such as the wiretap channel defined in [2], equivocation is unbounded and so e...
Chung Chan
BMCBI
2006
154views more  BMCBI 2006»
14 years 12 months ago
Automated recognition of malignancy mentions in biomedical literature
Background: The rapid proliferation of biomedical text makes it increasingly difficult for researchers to identify, synthesize, and utilize developed knowledge in their fields of ...
Yang Jin, Ryan T. McDonald, Kevin Lerman, Mark A. ...
CLASSIFICATION
2006
108views more  CLASSIFICATION 2006»
14 years 12 months ago
The Practice of Cluster Analysis
Abstracts "Mixtures at the Interface" David Scott, Rice University Mixture modeling provides an effective framework for complex, high-dimensional data. The potential of m...
Jon R. Kettenring
CN
2007
144views more  CN 2007»
14 years 11 months ago
SPP: An anti-phishing single password protocol
Most users have multiple accounts on the Internet where each account is protected by a password. To avoid the headache in remembering and managing a long list of different and un...
Mohamed G. Gouda, Alex X. Liu, Lok M. Leung, Moham...