Sciweavers

1444 search results - page 176 / 289
» The end of users
Sort
View
CHI
2010
ACM
15 years 5 months ago
Predicting the cost of error correction in character-based text entry technologies
Researchers have developed many models to predict and understand human performance in text entry. Most of the models are specific to a technology or fail to account for human fact...
Ahmed Sabbir Arif, Wolfgang Stuerzlinger
WIOPT
2005
IEEE
15 years 3 months ago
An Optimization Framework for Radio Resource Management Based on Utility vs. Price Tradeoff in WCDMA Systems
Abstract— In this paper we investigate Radio Resource Management strategies for multimedia networks driven by economic aspects such as users’ utility and service pricing. To th...
Leonardo Badia, Cristiano Saturni, Lorenzo Brunett...
79
Voted
ECML
2005
Springer
15 years 3 months ago
A Distance-Based Approach for Action Recommendation
Abstract. Rule induction has attracted a great deal of attention in Machine Learning and Data Mining. However, generating rules is not an end in itself because their applicability ...
Ronan Trepos, Ansaf Salleb, Marie-Odile Cordier, V...
DKE
2008
208views more  DKE 2008»
14 years 10 months ago
Deploying defeasible logic rule bases for the semantic web
Logic is currently the target of the majority of the upcoming efforts towards the realization of the Semantic Web vision, namely making the content of the Web accessible not only t...
Efstratios Kontopoulos, Nick Bassiliades, Grigoris...
101
Voted
CMS
2001
133views Communications» more  CMS 2001»
14 years 11 months ago
Asynchronous Large-Scale Certification Based on Certificate Verification Trees
Good public-key infrastructures (PKIs) are essential to make electronic commerce secure. Quite recently, certificate verification trees (CVTs) have been introduced as a tool for im...
M. Mar Albà, Josep Domingo-Ferrer, Francesc...