Sciweavers

2659 search results - page 102 / 532
» Do we mean the same
Sort
View
137
Voted
TOCHI
2010
90views more  TOCHI 2010»
15 years 2 months ago
Potential for personalization
Current Web search tools do a good job of retrieving documents that satisfy the wide range of intentions that people associate with a query – but do not do a very good job of di...
Jaime Teevan, Susan T. Dumais, Eric Horvitz
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
15 years 11 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
IJVR
2008
169views more  IJVR 2008»
15 years 4 months ago
Agent Architecture for a Real World Autonomous Virtual Guide: Interaction between the Decision and Perception Processes and Envi
Museums like marine aquariums are facing a difficult problem when trying to deliver information to their visitors. The exhibits they propose are dynamic by definition. Each may con...
Morgan Veyret, Eric Maisel, Jacques Tisseau
KI
2008
Springer
15 years 4 months ago
Collectives and How They Move: A Tale of Two Classifications
Abstract. Collective phenomena and their associated movement patterns are ubiquitous in everyday life. However, even though we need to be able to reason about these phenomena, espe...
Zena Wood, Antony Galton
ENTCS
2008
390views more  ENTCS 2008»
15 years 3 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel