Sciweavers

7434 search results - page 188 / 1487
» Still
Sort
View
ICWL
2009
Springer
15 years 11 months ago
Bridging the Gap: Adaptive Games and Student-Centered VLEs
The widely used e-learning technology is facing new challenges such as how to produce student-centered systems that can be adapted to the needs of each student. Those objectives sh...
Ángel del Blanco, Javier Torrente, Pablo Mo...
139
Voted
IDA
2009
Springer
15 years 11 months ago
Image Coding and Compression with Sparse 3D Discrete Cosine Transform
In this paper, an algorithm for image coding based on a sparse 3-dimensional Discrete Cosine Transform (3D DCT) is studied. The algorithm is essentially a method for achieving a su...
Hamid Palangi, Aboozar Ghafari, Massoud Babaie-Zad...
144
Voted
IDA
2009
Springer
15 years 11 months ago
Probabilistic Factorization of Non-negative Data with Entropic Co-occurrence Constraints
Abstract. In this paper we present a probabilistic algorithm which factorizes non-negative data. We employ entropic priors to additionally satisfy that user specified pairs of fac...
Paris Smaragdis, Madhusudana V. S. Shashanka, Bhik...
IPOM
2009
Springer
15 years 11 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
IPOM
2009
Springer
15 years 11 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...