Sciweavers

1012 search results - page 181 / 203
» What Robots Can Do
Sort
View
WWW
2005
ACM
16 years 11 days ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
WWW
2004
ACM
16 years 11 days ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
MOBIHOC
2005
ACM
15 years 11 months ago
Inducing spatial clustering in MAC contention for spread spectrum ad hoc networks
This paper proposes a new principle for designing MAC protocols for spread spectrum based ad hoc networks ? inducing spatial clustering in contending transmitters/receivers. We fi...
Xiangying Yang, Gustavo de Veciana
VL
1997
IEEE
198views Visual Languages» more  VL 1997»
15 years 3 months ago
Behavior Processors: Layers between End-Users and Java Virtual Machines
Visual programming approaches are limited in their usefulness if they do not include a profile of their users that defines exactly who is attempting to solve what kind of problems...
Alexander Repenning, Andri Ioannidou
BCSHCI
2007
15 years 1 months ago
Design, use and experience of e-learning systems
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
Willem-Paul Brinkman, Annette Payne, Nayna Patel, ...