Sciweavers

3570 search results - page 41 / 714
» A User Model for Information Erasure
Sort
View
JSAC
2008
95views more  JSAC 2008»
14 years 11 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
HICSS
2007
IEEE
212views Biometrics» more  HICSS 2007»
15 years 5 months ago
Fully-automatic generation of user interfaces for multiple devices from a high-level model based on communicative acts
The problems involved in the development of user interfaces become even more severe through the ubiquitous use of a variety of devices such as PCs, mobile phones and PDAs. Each of...
Jürgen Falb, Roman Popp, Thomas Röck, He...
LAWEB
2009
IEEE
15 years 5 months ago
A Model-Based Approach for Developing Vectorial User Interfaces
—This paper presents a model-based approach for developing vectorial user interfaces to an interactive applications, whether it is a web or a stand-alone applications. A vectoria...
Jean Vanderdonckt, Josefina Guerrero García...
UM
2010
Springer
14 years 9 months ago
User Modeling for Telecommunication Applications: Experiences and Practical Implications
Abstract. Telecommunication applications based on user modeling focus on extracting customer behavior and preferences from the information implicitly included in Call Detail Record...
Heath Hohwald, Enrique Frías-Martíne...
INFOCOM
2008
IEEE
15 years 5 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...