Sciweavers

4529 search results - page 827 / 906
» Position Based Cryptography
Sort
View
95
Voted
CHI
2009
ACM
16 years 1 months ago
Aesthetics matter: leveraging design heuristics to synthesize visually satisfying handheld interfaces
We present a tool for automatically generating UI layouts for handheld devices based on design principles. This tool introduces a gestalt approach to visual interface design rathe...
Yeonsoo Yang, Scott R. Klemmer
109
Voted
CHI
2009
ACM
16 years 1 months ago
A biologically inspired approach to learning multimodal commands and feedback for human-robot interaction
In this paper we describe a method to enable a robot to learn how a user gives commands and feedback to it by speech, prosody and touch. We propose a biologically inspired approac...
Anja Austermann, Seiji Yamada
95
Voted
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
16 years 1 months ago
Characteristic relational patterns
Research in relational data mining has two major directions: finding global models of a relational database and the discovery of local relational patterns within a database. While...
Arne Koopman, Arno Siebes
137
Voted
KDD
2009
ACM
262views Data Mining» more  KDD 2009»
16 years 1 months ago
Sentiment analysis of blogs by combining lexical knowledge with text classification
The explosion of user-generated content on the Web has led to new opportunities and significant challenges for companies, that are increasingly concerned about monitoring the disc...
Prem Melville, Wojciech Gryc, Richard D. Lawrence
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
16 years 1 months ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare