Sciweavers

2250 search results - page 64 / 450
» Authorizing applications in singularity
Sort
View
SAC
2005
ACM
15 years 3 months ago
A trust-enhanced recommender system application: Moleskiing
Recommender Systems (RS) suggests to users items they will like based on their past opinions. Collaborative Filtering (CF) is the most used technique to assess user similarity bet...
Paolo Avesani, Paolo Massa, Roberto Tiella
CHI
2005
ACM
15 years 10 months ago
Non-speech sound and paralinguistic parameters in mobile speech applications
This paper describes the background, research questions and methodology of user studies on the integration of nonspeech sound and paralinguistic parameters in speechenabled applic...
Peter Fröhlich
SIGCOMM
2004
ACM
15 years 3 months ago
The feasibility of supporting large-scale live streaming applications with dynamic application end-points
While application end-point architectures have proven to be viable solutions for large-scale distributed applications such as distributed computing and file-sharing, there is lit...
Kunwadee Sripanidkulchai, Aditya Ganjam, Bruce M. ...
ICCS
2004
Springer
15 years 3 months ago
An Application of the DEDS Control Synthesis Method
Abstract: An application of the method suitable for modelling and control of general discrete event dynamic systems (DEDS) to special kinds of communication systems is presented in...
Frantisek Capkovic
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 3 months ago
The BASP Agent-Based Modeling Framework: Applications, Scenarios and Lessons Learned
The Behavior Action Simulation Platform (BASP) has been in existence since early 2000, when it was first applied to small-team reconnaissance scenarios for the United States Marin...
David S. Dixon, William N. Reynolds