Sciweavers

2714 search results - page 444 / 543
» Model comparison with GenericDiff
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 20 days ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
105
Voted
CONCURRENCY
2008
104views more  CONCURRENCY 2008»
15 years 20 days ago
PERMIS: a modular authorization infrastructure
Authorization infrastructures manage privileges and render access control decisions, allowing applications to adjust their behavior according to the privileges allocated to users....
David W. Chadwick, Gansen Zhao, Sassa Otenko, Roma...
75
Voted
CORR
2008
Springer
89views Education» more  CORR 2008»
15 years 19 days ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
95
Voted
CSL
2010
Springer
15 years 19 days ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
110
Voted
ESWA
2008
152views more  ESWA 2008»
15 years 18 days ago
Collaborative recommender systems: Combining effectiveness and efficiency
Recommender systems base their operation on past user ratings over a collection of items, for instance, books, CDs, etc. Collaborative filtering (CF) is a successful recommendatio...
Panagiotis Symeonidis, Alexandros Nanopoulos, Apos...