Sciweavers

201 search results - page 23 / 41
» An Authorization Logic With Explicit Time
Sort
View
CHI
2009
ACM
14 years 11 months ago
User-created forms as an effective method of human-agent communication
A key challenge for mixed-initiative systems is to create a shared understanding of the task between human and agent. To address this challenge, we created a mixed-initiative inte...
John Zimmerman, Kathryn Rivard, Ian Hargraves, Ant...
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
14 years 11 months ago
New degree bounds for polynomial threshold functions
A real multivariate polynomial p(x1, . . . , xn) is said to sign-represent a Boolean function f : {0, 1}n {-1, 1} if the sign of p(x) equals f(x) for all inputs x {0, 1}n. We gi...
Ryan O'Donnell, Rocco A. Servedio
CHI
2010
ACM
14 years 5 months ago
Reactive information foraging for evolving goals
Information foraging models have predicted the navigation paths of people browsing the web and (more recently) of programmers while debugging, but these models do not explicitly m...
Joseph Lawrance, Margaret M. Burnett, Rachel K. E....
CHI
2010
ACM
14 years 5 months ago
A longitudinal study of how highlighting web content change affects people's web interactions
The Web is constantly changing, but most tools used to access Web content deal only with what can be captured at a single instance in time. As a result, Web users may not have a g...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
CSE
2009
IEEE
14 years 5 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner