Sciweavers

1092 search results - page 134 / 219
» Do summaries help
Sort
View
HICSS
1999
IEEE
113views Biometrics» more  HICSS 1999»
15 years 8 months ago
Judging People's Availability for Interaction from Video Snapshots
Several groupware systems support casual real time interaction over distance by providing periodically updated snapshots of other people's offices. People then monitor these ...
Brad Johnson, Saul Greenberg
WIDM
1999
ACM
15 years 8 months ago
Warehousing and Mining Web Logs
Analyzing Web Logs for usage and access trends can not only provide important information to web site developers and administrators, but also help in creating adaptive web sites. ...
Karuna P. Joshi, Anupam Joshi, Yelena Yesha, Raghu...
WCRE
1999
IEEE
15 years 8 months ago
Reusing Domains for the Construction of Reverse Engineering Tools
One of the challenges of reverse engineering is the extraction of a specification from source code. Our work proposes a singular approach to the construction of reverse engineerin...
Felipe Gouveia de Freitas, Julio Cesar Sampaio do ...
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
15 years 8 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...
CHI
1998
ACM
15 years 8 months ago
New Media, New Practices: Experiences in Open Learning Course Design
We explore some of the complex issues surrounding the design and use of multimedia and Internet-based learning resources in distance education courses. We do so by analysing our e...
Tamara Sumner, Josie Taylor