Sciweavers

4232 search results - page 840 / 847
» Can We Learn from ITSs
Sort
View
MM
2006
ACM
152views Multimedia» more  MM 2006»
14 years 4 months ago
Local image representations using pruned salient points with applications to CBIR
Salient points are locations in an image where there is a significant variation with respect to a chosen image feature. Since the set of salient points in an image capture import...
Hui Zhang, Rouhollah Rahmani, Sharath R. Cholleti,...
DIGRA
2005
Springer
14 years 4 months ago
The Nip and the Bite
An examination of the contributions that can be made by the field of non-mechanistic cybernetics (as elaborated by Gregory Bateson and Anthony Wilden) to a theory of videogames th...
Darshana Jayemanne
EGOV
2004
Springer
14 years 4 months ago
Software Acquisition Based on Business Models
In this paper, we present an approach based on hierarchically structured business models as artifacts of business process modeling that are used in a stepwise acquisition process f...
Peter Regner, Thomas Wiesinger, Josef Küng, R...
WKDD
2010
CPS
204views Data Mining» more  WKDD 2010»
14 years 4 months ago
A Scalable, Accurate Hybrid Recommender System
—Recommender systems apply machine learning techniques for filtering unseen information and can predict whether a user would like a given resource. There are three main types of...
Mustansar Ali Ghazanfar, Adam Prügel-Bennett
OOPSLA
2009
Springer
14 years 3 months ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...