Sciweavers

422 search results - page 77 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
82
Voted
AAAI
2006
15 years 1 months ago
Extracting Knowledge about Users' Activities from Raw Workstation Contents
A long-standing goal of AI is the development of intelligent workstation-based personal agents to assist users in their daily lives. A key impediment to this goal is the unrealist...
Tom M. Mitchell, Sophie H. Wang, Yifen Huang, Adam...
106
Voted
ATAL
2010
Springer
15 years 27 days ago
Automated negotiation with decommitment for dynamic resource allocation in cloud computing
We consider the problem of allocating networked resources in dynamic environment, such as cloud computing platforms, where providers strategically price resources to maximize thei...
Bo An, Victor R. Lesser, David Irwin, Michael Zink
IJVR
2008
118views more  IJVR 2008»
14 years 11 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
RECSYS
2009
ACM
15 years 6 months ago
Ordering innovators and laggards for product categorization and recommendation
Different buyers exhibit different purchasing behaviors. Some rush to purchase new products while others tend to be more cautious, waiting for reviews from people they trust. In...
Sarah K. Tyler, Shenghuo Zhu, Yun Chi, Yi Zhang
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 9 days ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...