Sciweavers

993 search results - page 146 / 199
» Classification Reliability and Its Use in Multi-classifier S...
Sort
View
ECTEL
2006
Springer
13 years 11 months ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno
KDD
2003
ACM
243views Data Mining» more  KDD 2003»
14 years 8 months ago
Accurate decision trees for mining high-speed data streams
In this paper we study the problem of constructing accurate decision tree models from data streams. Data streams are incremental tasks that require incremental, online, and any-ti...
João Gama, Pedro Medas, Ricardo Rocha
CHI
2008
ACM
14 years 8 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
ERCIMDL
2010
Springer
150views Education» more  ERCIMDL 2010»
13 years 8 months ago
A Search Log-Based Approach to Evaluation
Abstract. Anyone offering content in a digital library is naturally interested in assessing its performance: how well does my system meet the users' information needs? Standar...
Junte Zhang, Jaap Kamps
CCE
2005
13 years 7 months ago
Model-based computer-aided design for controlled release of pesticides
In the field of controlled release technology for pesticides or active ingredients (AI), models that can predict its delivery during application are important for purposes of desi...
Núria Muro-Suñé, Rafiqul Gani...