Sciweavers

895 search results - page 65 / 179
» A User Guide to HyTech
Sort
View
WWW
2005
ACM
16 years 4 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
124
Voted
IJCAI
2003
15 years 5 months ago
Improving the Performance of Recommender Systems That Use Critiquing
Personalization actions that tailor the Web experience to a particular user are an integral component of recommender systems. Here, product knowledge - either hand-coded or “mine...
Lorraine McGinty, Barry Smyth
IROS
2006
IEEE
139views Robotics» more  IROS 2006»
15 years 10 months ago
Bringing Together Human and Robotic Environment Representations A Pilot Study
— Human interaction with a service robot requires a shared representation of the environment for spoken dialogue and task specification where names used for particular locations...
Elin Anna Topp, Helge Hüttenrauch, Henrik I. ...
145
Voted
MMAS
2004
Springer
15 years 9 months ago
Designing Emergency Guidance in a Social Interaction Platform
Future computing systems interact with a large number of users moving around buildings and streets. In this paper, we propose an example of such systems and how to evaluate ubicomp...
Hideyuki Nakanishi, Toru Ishida
144
Voted
GECCO
2005
Springer
128views Optimization» more  GECCO 2005»
15 years 9 months ago
Collaborative interactive evolution
Interactive evolutionary computation (IEC) has proven useful in a variety of applications by combining the subjective evaluation of a user with the massive parallel search power o...
Sean R. Szumlanski, Annie S. Wu, Charles E. Hughes