Sciweavers

1156 search results - page 60 / 232
» The PENG System: Practice and Experience
Sort
View
TISSEC
2008
202views more  TISSEC 2008»
14 years 11 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning
JUCS
2007
118views more  JUCS 2007»
14 years 11 months ago
A Model of Immune Gene Expression Programming for Rule Mining
: Rule mining is an important issue in data mining. To address it, a novel Immune Gene Expression Programming (IGEP) model was proposed. Concepts of rule, gene, immune cell, and an...
Tao Zeng, Changjie Tang, Yong Xiang, Peng Chen, Yi...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
14 years 9 months ago
Trust network inference for online rating data using generative models
In an online rating system, raters assign ratings to objects contributed by other users. In addition, raters can develop trust and distrust on object contributors depending on a f...
Freddy Chong Tat Chua, Ee-Peng Lim
ICDM
2009
IEEE
111views Data Mining» more  ICDM 2009»
14 years 9 months ago
To Trust or Not to Trust? Predicting Online Trusts Using Trust Antecedent Framework
This paper analyzes the trustor and trustee factors that lead to inter-personal trust using a well studied Trust Antecedent framework in management science [10]. To apply these fac...
Viet-An Nguyen, Ee-Peng Lim, Jing Jiang, Aixin Sun
ICALT
2006
IEEE
15 years 5 months ago
Composing Adaptive Learning Systems
Adaptive learning systems are recognized as one of the most interesting research topics in intelligent learning management systems. Taking as a point of departure the practices an...
Dirk Frosch-Wilke, Salvador Sánchez Alonso