This paper looks at the problem of data prioritization, commonly found in mobile ad-hoc networks. The proposed general solution uses a machine learning approach in order to learn ...
The American Recovery and Reinvestment Act (2009) promised strict accounting of all funds spent and the publication of that information to the public in relative real-time. The fe...
Natalie Helbig, Evgeny Styrin, Donna S. Canestraro...
In this paper, we provide a report about the 8th French-speaking conference on Knowledge Discovery and Management (EGC'2008) [1] held in Sophia Antipolis, France, from Januar...
In this paper, we report on our experience in designing and delivering two new software design courses in the Informatics major at UC Irvine. When the major was created in 2004, i...
Abstract. When a vulnerability is discovered in a cryptographic algorithm, or in a specific implementation of that algorithm, it is important that software using that algorithm or...