Sciweavers

20017 search results - page 117 / 4004
» Using personas effectively
Sort
View
SAC
2005
ACM
15 years 7 months ago
The role of visualization in effective data cleaning
Using visualization techniques to assist conventional data mining tasks has attracted considerable interest in recent years. This paper addresses a challenging issue in the use of...
Yu Qian, Kang Zhang
ATAL
2004
Springer
15 years 7 months ago
When to Apply the Fifth Commandment: The Effects of Parenting on Genetic and Learning Agents
This paper explores hybrid agents that use a variety of techniques to improve their performance in an environment over time. We considered, specifically, geneticlearning-parentin...
Michael Berger, Jeffrey S. Rosenschein
RE
2004
Springer
15 years 7 months ago
The Effect of Trust Assumptions on the Elaboration of Security Requirements
Assumptions are frequently made during requirements analysis of a system-to-be about the trustworthiness of its various components (including human components). These trust assump...
Charles B. Haley, Robin C. Laney, Jonathan D. Moff...
WLP
2004
Springer
15 years 7 months ago
Effective Modeling with Constraints
Constraint programming provides a declarative approach to solving combinatorial (optimization) problems. The user just states the problem as a constraint satisfaction problem (CSP)...
Roman Barták
IPPS
2003
IEEE
15 years 7 months ago
Quantifying Locality Effect in Data Access Delay: Memory logP
The application of hardware-parameterized models to distributed systems can result in omission of key bottlenecks such as the full cost of inter-node communication in a shared mem...
Kirk W. Cameron, Xian-He Sun