Sciweavers

2500 search results - page 165 / 500
» Specifying Behavior in C
Sort
View
108
Voted
HICSS
2007
IEEE
109views Biometrics» more  HICSS 2007»
15 years 9 months ago
Personality Matters: Incorporating Detailed User Attributes and Preferences into the Matchmaking Process
Finding ways of reducing undesired behavior in online interactions is at the forefront of the social computing research agenda. One promising way to reduce perceived “bad behavi...
Jens Riegelsberger, Scott Counts, Shelly Farnham, ...
128
Voted
IMC
2006
ACM
15 years 9 months ago
Web search clickstreams
Search engines are a vital part of the Web and thus the Internet infrastructure. Therefore understanding the behavior of users searching the Web gives insights into trends, and en...
Nils Kammenhuber, Julia Luxenburger, Anja Feldmann...
IUI
1998
ACM
15 years 7 months ago
Coherent Gestures, Locomotion, and Speech in Life-like Pedagogical Agents
Life-likeanimatedinterfaceagentsforknowledge-basedlearning environments can provide timely, customized advice to support students’ problem solving. Because of their strong visua...
Stuart G. Towns, Jennifer L. Voerman, Charles B. C...
124
Voted
DBSEC
2010
126views Database» more  DBSEC 2010»
15 years 5 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
116
Voted
CCR
2004
87views more  CCR 2004»
15 years 3 months ago
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Steve Uhlig