Sciweavers

6682 search results - page 1259 / 1337
» networks 2006
Sort
View
129
Voted
IDA
2006
Springer
15 years 17 days ago
Sequential patterns for text categorization
Text categorization is a well-known task based essentially on statistical approaches using neural networks, Support Vector Machines and other machine learning algorithms. Texts are...
Simon Jaillet, Anne Laurent, Maguelonne Teisseire
IJVR
2008
118views more  IJVR 2008»
15 years 17 days ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
69
Voted
CN
2007
115views more  CN 2007»
15 years 17 days ago
Parallel overlays for high data-rate multicast data transfer
Recently a number of application-layer multicast (ALM) protocols have been proposed as a promising alternative to deploying multicast services in the unicast-only Internet. Curren...
Ka Ki To, Jack Y. B. Lee
99
Voted
CN
2007
142views more  CN 2007»
15 years 17 days ago
Performance modeling of epidemic routing
In this paper, we develop a rigorous, unified framework based on ordinary differential equations (ODEs) to study epidemic routing and its variations. These ODEs can be derived a...
Xiaolan Zhang, Giovanni Neglia, James F. Kurose, D...
ISI
2006
Springer
15 years 16 days ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
« Prev « First page 1259 / 1337 Last » Next »