Sciweavers

2853 search results - page 385 / 571
» Finding related tables
Sort
View
CHI
2009
ACM
14 years 3 months ago
Awareness, training and trust in interaction with adaptive spam filters
Even though adaptive (trainable) spam filters are a common example of systems that make (semi-)autonomous decisions on behalf of the user, trust in these filters has been underexp...
Henriette S. M. Cramer, Vanessa Evers, Maarten van...
IAT
2009
IEEE
14 years 3 months ago
Intelligent Crawling in Virtual Worlds
—We present an intelligent agent crawler designed to collect user-generated content in Second Life and related virtual worlds. The agents navigate autonomously through the world ...
Josh Eno, Susan Gauch, Craig W. Thompson
ICASSP
2009
IEEE
14 years 3 months ago
Compression of image patches for local feature extraction
Local features are widely used for content-based image retrieval and object recognition. We present an efficient method for encoding digital images suitable for local feature extr...
Mina Makar, Chuo-Ling Chang, David M. Chen, Sam S....
AIED
2009
Springer
14 years 2 months ago
Feedback Specificity and the Learning of Intercultural Communication Skills
The role of explicit feedback in learning has been studied from a variety of perspectives and in many contexts. In this paper, we examine the impact of the specificity of feedback ...
Matthew Hays, H. Chad Lane, Daniel Auerbach, Mark ...
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham