Sciweavers

1489 search results - page 210 / 298
» The First Bug Report
Sort
View
SIGECOM
2008
ACM
126views ECommerce» more  SIGECOM 2008»
15 years 5 months ago
Behavioral experiments in networked trade
We report on an extensive series of highly controlled human subject experiments in networked trade. Our point of departure is a simple and well-studied bipartite network exchange ...
J. Stephen Judd, Michael Kearns
SAC
2006
ACM
15 years 5 months ago
Transformation of yEPC business process models to YAWL
Model transformations are frequently applied in business process modeling to bridge between languages on a different abstraction and formality. In this paper, we define a transfor...
Jan Mendling, Michael Moser, Gustaf Neumann
AIEDU
2005
106views more  AIEDU 2005»
15 years 5 months ago
A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms
Two approaches to building intelligent tutoring systems are the well-established model-tracing paradigm and the relatively newer constraint-based paradigm. Proponents of the constr...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
208
Voted
TIP
2008
344views more  TIP 2008»
15 years 5 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
TIT
2008
90views more  TIT 2008»
15 years 5 months ago
An Improved Sphere-Packing Bound for Finite-Length Codes Over Symmetric Memoryless Channels
This paper derives an improved sphere-packing (ISP) bound for finite-length error-correcting codes whose transmission takes place over symmetric memoryless channels, and the codes...
Gil Wiechman, Igal Sason