A basic tradeoff to consider when designing a distributed data-mining framework is the need for a compromise between the cost of communication and computation resources and the accuracy of the mining results. This is essentially a decision of whether it is more efficient to communicate all of the data to...
Remote sensors are becoming the standard for observing and recording ecological data in the field. Such sensors can record data at fine temporal resolutions, and they can operate under extreme conditions prohibitive to human access. Unfortunately, sensor data streams exhibit many kinds of errors ranging from corrupt communications to partial...
Potentially large savings can be realized within the forest industry by improved machine scheduling, labour scheduling, machine investment, inventory management, and the maximization of wood value. Forecasting must change within the forest industry from Ttguesstimatesll to more efficient production forecasting models. Much work needs to be done with data collection...
Information security is an important concern in today’s communication and business world. To achieve these security functions, cryptography is utilized. RSA and the Diffie Hellman key exchange are some examples of cryptography algorithms that use modular multiplication to compute modular exponentiations. Modular multiplication requires division operations which becomes very time...
During the last few years we have seen formidable advances in digital and mobile
communication technologies such as cordless and cellular telephones, personal
communication systems, Internet connection expansion, etc. The vast majority
of digital information used in all these applications is stored and also processed
within a computer system, and...
Knowledge workers are struggling in the information flood. There is a growing interest in intelligent desktop environments that help knowledge workers organize their daily life. Intelligent desktop environments allow the desktop user to define a set of “activities” that characterize the user’s desktop work. These environments then attempt to identify...
Protecting end-users privacy and building trust are the two most important factors needed to support the growth of ecommerce. The increased dependence on the Internet for a wide variety of daily transactions causes a corresponding loss in privacy for many users, as virtually all websites collect data from users directly...
The search for archaeological materials dating to 15,000 yr BP along the southern Oregon coast is a formidable task. Using ethnographic, theoretical, and archaeological data, landscape resources which would have influenced land-use and occupation location decisions in the past are highlighted. Additionally, environmental data pertaining to the late Pleistocene is...
Maintaining the sustainability of the earth’s ecosystems has attracted much attention as these ecosystems are facing more and more pressure from human activities. Machine learning can play an important role in promoting sustainability as a large amount of data is being collected from ecosystems. There are at least three important...
The spread of the internet and communications techniques increases the necessity
for security in applications that involves sharing or exchange of secret or private infor-
mation. Public-key cryptography is widely used in establishing secure communication
channels between the users on the Internet, for E-commerce transactions, and in net-
work security...