Sciweavers

1917 search results - page 240 / 384
» User Model and Utility Based Power Management
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 10 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
BMCBI
2008
146views more  BMCBI 2008»
15 years 4 months ago
EST Express: PHP/MySQL based automated annotation of ESTs from expression libraries
Background: Several biological techniques result in the acquisition of functional sets of cDNAs that must be sequenced and analyzed. The emergence of redundant databases such as U...
Robin P. Smith, William J. Buchser, Marcus B. Lemm...
ICC
2008
IEEE
203views Communications» more  ICC 2008»
15 years 10 months ago
Spectrum Leasing via Distributed Cooperation in Cognitive Radio
Abstract— The concept of cognitive radio (or secondary spectrum access) is currently under investigation as a promising paradigm to achieve efficient use of the frequency resour...
Igor Stanojev, Osvaldo Simeone, Yeheskel Bar-Ness,...
174
Voted
KDD
2010
ACM
259views Data Mining» more  KDD 2010»
15 years 8 months ago
A probabilistic model for personalized tag prediction
Social tagging systems have become increasingly popular for sharing and organizing web resources. Tag recommendation is a common feature of social tagging systems. Social tagging ...
Dawei Yin, Zhenzhen Xue, Liangjie Hong, Brian D. D...
189
Voted
WEBNET
2001
15 years 5 months ago
An Adaptive Hypermedia Presentation Modeling System for Custom Knowledge Representations
We propose a generic presentation system for adaptive educational hypermedia that is highly independent from domain knowledge representation and application state management. Our a...
Pablo Castells, José Antonio Macías ...