Sciweavers

10625 search results - page 1876 / 2125
» Supporting delay-intolerant applications
Sort
View
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
15 years 5 months ago
An Efficient Algorithm for Real-Time Frequent Pattern Mining for Real-Time Business Intelligence Analytics
Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of in...
Rajanish Dass, Ambuj Mahanti
HICSS
2006
IEEE
90views Biometrics» more  HICSS 2006»
15 years 5 months ago
Text Understanding Agents and the Semantic Web
— We discuss the challenges involved in adapting the OntoSem natural language processing system to the Web. One set of tasks involves processing Web documents, translating their ...
Akshay Java, Tim Finin, Sergei Nirenburg
HICSS
2006
IEEE
145views Biometrics» more  HICSS 2006»
15 years 5 months ago
Resource Decisions in Software Development Using Risk Assessment Model
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Wiboon Jiamthubthugsin, Daricha Sutivong
86
Voted
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
15 years 5 months ago
Tools for Building Intelligent Tutoring Systems
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generatorsâ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
76
Voted
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 5 months ago
Lookahead Cascade for Table Access on Small Devices
Users increasingly expect access to Web data from a wide range of devices, both wired and wireless. The goal of our research is to inform the design of applications that support d...
Rui Zhang, Carolyn R. Watters, Jack Duffy
« Prev « First page 1876 / 2125 Last » Next »