Sciweavers

3451 search results - page 598 / 691
» Collaborative attack modeling
Sort
View
CHI
2009
ACM
14 years 8 months ago
Leveraging open-source software in the design and development process
This paper presents a case study of the NASA Ames Research Center HCI Group's design and development of a problem reporting system for NASA's next generation vehicle (to...
Collin Green, Irene Tollinger, Christian Ratterman...
CHI
2009
ACM
14 years 8 months ago
Information foraging in E-voting
In this paper, we present a case study of humaninformation interaction in the online realm of politics. The case study consists of a participant observed while searching and brows...
Ravi K. Vatrapu, Scott P. Robertson
KDD
2004
ACM
150views Data Mining» more  KDD 2004»
14 years 8 months ago
Complete This Puzzle: A Connectionist Approach to Accurate Web Recommendations Based on a Committee of Predictors
Abstract. We present a Context Ultra-Sensitive Approach based on two-step Recommender systems (CUSA-2step-Rec). Our approach relies on a committee of profile-specific neural networ...
Olfa Nasraoui, Mrudula Pavuluri
KDD
2003
ACM
217views Data Mining» more  KDD 2003»
14 years 8 months ago
Algorithms for estimating relative importance in networks
Large and complex graphs representing relationships among sets of entities are an increasingly common focus of interest in data analysis--examples include social networks, Web gra...
Scott White, Padhraic Smyth
CHI
2004
ACM
14 years 8 months ago
All together now: visualizing local and remote actors of localized activity
We present All Together Now (ATN), a tool for visualizing localized activities involving both local and remote actors. ATN presents each user with a webpage containing a common vi...
Scott Lederer, Jeffrey Heer