Sciweavers

2259 search results - page 298 / 452
» Mining Actionable Patterns
Sort
View
VL
2009
IEEE
126views Visual Languages» more  VL 2009»
15 years 10 months ago
Revealing the copy and paste habits of end users
Transferring data across applications is a common end user task, and copying and pasting via the clipboard lets users do so relatively easily. Using the clipboard, however, can al...
Kathryn T. Stolee, Sebastian G. Elbaum, Gregg Roth...
151
Voted
PERSUASIVE
2007
Springer
15 years 9 months ago
The Behavior Chain for Online Participation: How Successful Web Services Structure Persuasion
The success of many online services today depends on the company’s ability to persuade users to take specific actions, such as registering or inviting friends. We examined over 5...
B. J. Fogg, Dean Eckles
120
Voted
JIT
2004
Springer
131views Database» more  JIT 2004»
15 years 9 months ago
Agile Software Engineering: A New System for an Expanding Business Model at SCHUFA
A software development unit called to renew or replace an existing corporate system may face some special problems in an established company with a lot of well-trained behavioral p...
Rainer Burkhardt, Volker Gruhn
119
Voted
RSCTC
2000
Springer
122views Fuzzy Logic» more  RSCTC 2000»
15 years 7 months ago
Computer Vision Using Fuzzy Logic for Robot Manipulator
: This paper presents a Lab. implementation of a computer vision using fuzzy models for pattern recognition for the detection of boundaries in images obtained through a camera inst...
Adriano Breunig, Haroldo R. de Azevedo, Edilberto ...
AINA
2007
IEEE
15 years 3 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang