Sciweavers

699 search results - page 140 / 140
» Methods and systems for intelligent human-computer interacti...
Sort
View
KDD
2005
ACM
192views Data Mining» more  KDD 2005»
14 years 5 months ago
Modeling and predicting personal information dissemination behavior
In this paper, we propose a new way to automatically model and predict human behavior of receiving and disseminating information by analyzing the contact and content of personal c...
Xiaodan Song, Ching-Yung Lin, Belle L. Tseng, Ming...
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
13 years 10 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
ICSE
2010
IEEE-ACM
13 years 7 months ago
Supporting developers with natural language queries
The feature list of modern IDEs is steadily growing and mastering these tools becomes more and more demanding, especially for novice programmers. Despite their remarkable capabili...
Michael Würsch, Giacomo Ghezzi, Gerald Reif, ...
CSUR
2004
149views more  CSUR 2004»
13 years 5 months ago
A review of vessel extraction techniques and algorithms
Vessel segmentation algorithms are the critical components of circulatory blood vessel analysis systems. We present a survey of vessel extraction techniques and algorithms. We put ...
Cemil Kirbas, Francis K. H. Quek