Sciweavers

1791 search results - page 182 / 359
» Behavioral Operations
Sort
View
134
Voted
TDSC
2008
87views more  TDSC 2008»
15 years 4 months ago
Credit Card Fraud Detection Using Hidden Markov Model
Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for bo...
Abhinav Srivastava, Amlan Kundu, Shamik Sural, Aru...
AC
2004
Springer
15 years 4 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
CGF
2004
114views more  CGF 2004»
15 years 4 months ago
Smooth Surface Reconstruction Using Tensor Fields as Structuring Elements
We propose a new strategy to estimate surface normal information from highly noisy sparse data. Our approach is based on a tensor field morphologically adapted to infer normals. I...
Marcelo Bernardes Vieira, Paulo P. Martins Jr., Ar...
CACM
2000
116views more  CACM 2000»
15 years 4 months ago
Embodied Conversational Interface Agents+
People engage in small talk and conversational storytelling to provide information in engaging ways and to serve interpersonal goals such as building rapport and credibility. Embo...
Justine Cassell
121
Voted
CN
1998
105views more  CN 1998»
15 years 3 months ago
WebL - A Programming Language for the Web
In this paper we introduce a programming language for Web document processing called WebL. WebL is a high level, object-oriented scripting language that incorporates two novel fea...
Thomas Kistler, Hannes Marais