Sciweavers

254 search results - page 44 / 51
» A User Modeling Approach to Determining System Initiative in...
Sort
View
SMA
2009
ACM
149views Solid Modeling» more  SMA 2009»
14 years 2 months ago
A sketching interface for feature curve recovery of free-form surfaces
In this paper, we present a semi-automatic approach to efficiently and robustly recover the characteristic feature curves of a given free-form surface. The technique supports a s...
Ellen Dekkers, Leif Kobbelt, Richard R. Pawlicki, ...
AAAI
2008
13 years 10 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
INFOCOM
2009
IEEE
14 years 2 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
NLE
2008
77views more  NLE 2008»
13 years 7 months ago
Generating basic skills reports for low-skilled readers
We describe SkillSum, a Natural Language Generation (NLG) system that generates a personalised feedback report for someone who has just completed a screening assessment of their b...
Sandra Williams, Ehud Reiter
CAISE
2010
Springer
13 years 8 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song