Sciweavers

1266 search results - page 132 / 254
» AS Relationships: Inference and Validation
Sort
View
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 4 months ago
Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks
— This paper presents a new notion of authenticating degraded multimedia content streamed over wireless networks – Unequal Authenticity Protection (UAP). Multimedia content dif...
Zhi Li, Qibin Sun, Yong Lian
ACMDIS
2006
ACM
15 years 4 months ago
Investigating design knowledge reuse for interface development
Reusing HCI design knowledge shows potential in allowing practitioners to design based on previously identified concerns. A reuse approach is presented that is based on claims, de...
Shahtab Wahid
HT
2006
ACM
15 years 4 months ago
Hyperlink assessment based on web usage mining
One of the basic methods of web usage mining are association rules that indicate relationships among common use of web pages. Positive and confined negative association rules are ...
Przemyslaw Kazienko, Marcin Pilarczyk
JCDL
2004
ACM
89views Education» more  JCDL 2004»
15 years 3 months ago
Machine learning for information architecture in a large governmental website
This paper describes ongoing research into the application of machine learning techniques for improving access to governmental information in complex digital libraries. Under the ...
Miles Efron, Jonathan L. Elsas, Gary Marchionini, ...
DALT
2004
Springer
15 years 3 months ago
Representational Content and the Reciprocal Interplay of Agent and Environment
Declarative modelling approaches in principle assume a notion of representation or representational content for the modelling concepts. The notion of representational content as di...
Tibor Bosse, Catholijn M. Jonker, Jan Treur