Sciweavers

1626 search results - page 129 / 326
» Computing the Types of the Relationships between Autonomous ...
Sort
View
CHI
2005
ACM
14 years 9 months ago
Visualization in law enforcement
Visualization techniques have proven to be critical in helping crime analysis. By interviewing and observing Criminal Intelligence Officers (CIO) and civilian crime analysts at th...
Hsinchun Chen, Homa Atabakhsh, Chunju Tseng, Byron...
TIT
2010
124views Education» more  TIT 2010»
13 years 3 months ago
On the capacity of the precision-resolution system
Arguably, the most prominent constrained system in storage applications is the (d; k)-run-length limited (RLL) system, where every binary sequence obeys the constraint that every t...
Moshe Schwartz, Jehoshua Bruck
CHI
2002
ACM
14 years 9 months ago
Effects of four computer-mediated communications channels on trust development
When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game ...
Nathan Bos, Judith S. Olson, Darren Gergle, Gary M...
CORR
2007
Springer
110views Education» more  CORR 2007»
13 years 9 months ago
Graph Annotations in Modeling Complex Network Topologies
abstract such additional information as network annotations. We introduce a network topology modeling framework that treats annotations as an extended correlation profile of a net...
Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, A...
CHI
2009
ACM
14 years 3 months ago
Awareness, training and trust in interaction with adaptive spam filters
Even though adaptive (trainable) spam filters are a common example of systems that make (semi-)autonomous decisions on behalf of the user, trust in these filters has been underexp...
Henriette S. M. Cramer, Vanessa Evers, Maarten van...