Sciweavers

1005 search results - page 10 / 201
» Can machines call people
Sort
View
ACISP
2005
Springer
14 years 1 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ML
2006
ACM
110views Machine Learning» more  ML 2006»
13 years 7 months ago
Distribution-based aggregation for relational learning with identifier attributes
Abstract Identifier attributes--very high-dimensional categorical attributes such as particular product ids or people's names--rarely are incorporated in statistical modeling....
Claudia Perlich, Foster J. Provost
CLEF
2010
Springer
13 years 8 months ago
Wikipedia Vandalism Detection Through Machine Learning: Feature Review and New Proposals - Lab Report for PAN at CLEF 2010
Wikipedia is an online encyclopedia that anyone can edit. In this open model, some people edits with the intent of harming the integrity of Wikipedia. This is known as vandalism. W...
Santiago Moisés Mola-Velasco
JLP
2002
90views more  JLP 2002»
13 years 7 months ago
Combining programs and state machines
State machines consume and process actions complementary to programs issuing actions. State machines maintain a state and reply with a boolean response to each action in their int...
Jan A. Bergstra, Alban Ponse
CSCW
2011
ACM
13 years 2 months ago
From ethnographic study to mixed reality: a remote collaborative troubleshooting system
In this paper we describe how we moved from ethnographic study to design and testing of a Mixed Reality (MR) system, supporting collaborative troubleshooting of office copiers and...
Jacki O'Neill, Stefania Castellani, Fréd&ea...