Sciweavers

14244 search results - page 2604 / 2849
» Modeling Program Predictability
Sort
View
154
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 18 days ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
158
Voted
ICNC
2010
Springer
15 years 17 days ago
Emotional talking agent: System and evaluation
In this paper, we introduce a system that synthesizes the emotional audio-visual speech for a 3-D talking agent by adopting the PAD (Pleasure-Arousal-Dominance) emotional model. A ...
Shen Zhang, Jia Jia, Yingjin Xu, Lianhong Cai
133
Voted
PKDD
2010
Springer
178views Data Mining» more  PKDD 2010»
15 years 14 days ago
Graph Regularized Transductive Classification on Heterogeneous Information Networks
A heterogeneous information network is a network composed of multiple types of objects and links. Recently, it has been recognized that strongly-typed heterogeneous information net...
Ming Ji, Yizhou Sun, Marina Danilevsky, Jiawei Han...
150
Voted
RTAS
2010
IEEE
15 years 14 days ago
Middleware for Resource-Aware Deployment and Configuration of Fault-Tolerant Real-time Systems
Developing large-scale distributed real-time and embedded (DRE) systems is hard in part due to complex deployment and configuration issues involved in satisfying multiple quality f...
Jaiganesh Balasubramanian, Aniruddha S. Gokhale, A...
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 12 days ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
« Prev « First page 2604 / 2849 Last » Next »