Sciweavers

1224 search results - page 11 / 245
» Building systems that users want to use
Sort
View
ACL
2008
13 years 8 months ago
Assessing Dialog System User Simulation Evaluation Measures Using Human Judges
Previous studies evaluate simulated dialog corpora using evaluation measures which can be automatically extracted from the dialog systems' logs. However, the validity of thes...
Hua Ai, Diane J. Litman
SOUPS
2009
ACM
14 years 1 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
BMCBI
2006
126views more  BMCBI 2006»
13 years 6 months ago
Genomes as geography: using GIS technology to build interactive genome feature maps
Background: Many commonly used genome browsers display sequence annotations and related attributes as horizontal data tracks that can be toggled on and off according to user prefe...
Mary E. Dolan, Constance C. Holden, M. Kate Beard,...
RTCSA
2007
IEEE
14 years 1 months ago
A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments
Compared to all emerging issues, privacy is probably the most prominent concern when it comes to judging the effects of a wide spread deployment of ubiquitous computing. On one ha...
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, He...
SEM
2004
Springer
14 years 2 days ago
A Middleware Centric Approach to Building Self-Adapting Systems
The use of handheld networked devices to access information systems by people moving around is spreading rapidly. Systems being used in this way typically face dynamic variation in...
Svein O. Hallsteinsen, Jacqueline Floch, Erlend St...