Sciweavers

446 search results - page 73 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
SIGUCCS
2003
ACM
15 years 5 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
KI
2002
Springer
14 years 11 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
86
Voted
MOBISYS
2005
ACM
15 years 11 months ago
Reincarnating PCs with portable SoulPads
The ability to walk up to any computer, personalize it, and use it as one's own has long been a goal of mobile computing research. We present SoulPad, a new approach based on...
Ramón Cáceres, Casey Carter, Chandra...
TSE
2008
113views more  TSE 2008»
14 years 11 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
JUCS
2007
84views more  JUCS 2007»
14 years 11 months ago
Formal Representations of Learning Scenarios: A Methodology to Configure E-Learning Systems
: Nowadays, advanced E-Learning systems are generally pedagogy-aware. Commonly, these systems include facilities for defining so-called learning scenarios that reflect sophisticate...
Denis Helic