Sciweavers

695 search results - page 134 / 139
» A Methodology for the Design of Courses in Information Syste...
Sort
View
DEBS
2007
ACM
13 years 9 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
ATAL
2006
Springer
13 years 11 months ago
Learning empathy: a data-driven framework for modeling empathetic companion agents
Affective reasoning plays an increasingly important role in cognitive accounts of social interaction. Humans continuously assess one another's situational context, modify the...
Scott W. McQuiggan, James C. Lester
SACMAT
2009
ACM
14 years 2 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
SIGECOM
2005
ACM
132views ECommerce» more  SIGECOM 2005»
14 years 1 months ago
Integrating tradeoff support in product search tools for e-commerce sites
In a previously reported user study, we found that users were able to perform decision tradeoff tasks more efficiently and commit considerably fewer errors with the example critiq...
Pearl Pu, Li Chen
AFRIGRAPH
2004
ACM
14 years 1 months ago
Visualizing 3D scenes using non-linear projections and data mining of previous camera movements
We describe techniques for exploring 3D scenes by combining non-linear projections with the interactive data mining of camera navigations from previous explorations. Our approach ...
Karan Singh, Ravin Balakrishnan