Sciweavers

47 search results - page 7 / 10
» An Empirical Activity Model for WLAN Users
Sort
View
AAAI
2006
13 years 9 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
VL
2002
IEEE
100views Visual Languages» more  VL 2002»
14 years 15 days ago
Using HCI Techniques to Design a More Usable Programming System
A programming system is the user interface between the programmer and the computer. Programming is a notoriously difficult activity, and some of this difficulty can be attribute...
John F. Pane, Brad A. Myers, Leah B. Miller
DSS
2007
120views more  DSS 2007»
13 years 7 months ago
Could the use of a knowledge-based system lead to implicit learning?
The primary objective of a knowledge-based system (KBS) is to use stored knowledge to provide support for decision-making activities. Empirical studies identify improvements in de...
Solomon R. Antony, Radhika Santhanam
CONSTRAINTS
1998
120views more  CONSTRAINTS 1998»
13 years 7 months ago
Constrained Graph Layout
Most current graph layout technology does not lend itself to interactive applications such as animation or advanced user interfaces. We introduce the constrained graph layout model...
Weiqing He, Kim Marriott
ICC
2007
IEEE
288views Communications» more  ICC 2007»
14 years 1 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang