Sciweavers

1051 search results - page 181 / 211
» Analyzing Resource Behavior Using Process Mining
Sort
View
JOCN
2011
133views more  JOCN 2011»
12 years 10 months ago
A Candidate for the Attentional Bottleneck: Set-size Specific Modulation of the Right TPJ during Attentive Enumeration
■ Several recent behavioral studies have shown that the enumeration of a small number of items (a process termed subitizing) depends on the availability of attentional resources...
Petra Vetter, Brian Butterworth, Bahador Bahrami
CHI
2010
ACM
14 years 2 months ago
Predicting the cost of error correction in character-based text entry technologies
Researchers have developed many models to predict and understand human performance in text entry. Most of the models are specific to a technology or fail to account for human fact...
Ahmed Sabbir Arif, Wolfgang Stuerzlinger
ATAL
2009
Springer
14 years 2 months ago
Pragmatic-strategic reputation-based decisions in BDI agents
Computational trust and reputation models have been recognized as one of the key technologies required to design and implement agent systems. These models manage and aggregate the...
Isaac Pinyol, Jordi Sabater-Mir
EICS
2009
ACM
14 years 2 months ago
Engineering crowd interaction within smart environments
Smart environments (e.g., airports, hospitals, stadiums, and other physical spaces using ubiquitous computing to empower many mobile people) provide novel challenges for usability...
Michael D. Harrison, Mieke Massink, Diego Latella
CIA
2008
Springer
13 years 10 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...