Sciweavers

1075 search results - page 190 / 215
» Using Activity Theory to Model Context Awareness
Sort
View
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
15 years 8 months ago
A Formal Approach towards Assessing the Effectiveness of Anti-Spam Procedures
Spam e-mails have become a serious technological and economic problem. So far we have been reasonably able to resist spam e-mails and use the Internet for regular communication by...
Guido Schryen
AGI
2008
15 years 3 months ago
Fusing Animals and Humans
AI has many techniques and tools at its disposal, yet seems to be lacking some special "juice" needed to create a true being. We propose that the missing ingredients are ...
Jonathan Connell
DPD
2002
125views more  DPD 2002»
15 years 1 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
WWW
2008
ACM
16 years 2 months ago
Optimal marketing strategies over social networks
We discuss the use of social networks in implementing viral marketing strategies. While influence maximization has been studied in this context (see Chapter 24 of [10]), we study ...
Jason D. Hartline, Vahab S. Mirrokni, Mukund Sunda...
CVPR
2005
IEEE
16 years 3 months ago
Bayesian Object Detection in Dynamic Scenes
Detecting moving objects using stationary cameras is an important precursor to many activity recognition, object recognition and tracking algorithms. In this paper, three innovati...
Yaser Sheikh, Mubarak Shah