Sciweavers

2094 search results - page 174 / 419
» A Bayesian Approach for User Modeling in Dialogue Systems
Sort
View
KDD
2005
ACM
218views Data Mining» more  KDD 2005»
16 years 5 months ago
A maximum entropy web recommendation system: combining collaborative and content features
Web users display their preferences implicitly by navigating through a sequence of pages or by providing numeric ratings to some items. Web usage mining techniques are used to ext...
Xin Jin, Yanzan Zhou, Bamshad Mobasher
NLE
2007
148views more  NLE 2007»
15 years 4 months ago
Abbreviated text input using language modeling
We address the problem of improving the efficiency of natural language text input under degraded conditions (for instance, on mobile computing devices or by disabled users), by ta...
Stuart M. Shieber, Rani Nelken
HCSE
2010
15 years 2 months ago
The Secret Lives of Assumptions: Developing and Refining Assumption Personas for Secure System Design
Personas are useful for obtaining an empirically grounded understanding of a secure system's user population, its contexts of use, and possible vulnerabilities and threats end...
Shamal Faily, Ivan Flechais
168
Voted
WECWIS
2008
IEEE
361views ECommerce» more  WECWIS 2008»
15 years 11 months ago
How to Describe Workflow Information Systems to Support Business Process
This paper addresses a methodology for developing the various user interfaces (UI) of a workflow information system (WIS), which are advocated to automate business processes, foll...
Josefina Guerrero García, Jean Vanderdonckt...
CCS
2009
ACM
15 years 11 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...