Sciweavers

331 search results - page 38 / 67
» How Applicable is Your Evaluation Methods - Really
Sort
View
145
Voted
AAAI
2011
14 years 3 months ago
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models
With smart-phones becoming increasingly commonplace, there has been a subsequent surge in applications that continuously track the location of users. However, serious privacy conc...
Justin Cranshaw, Jonathan Mugan, Norman M. Sadeh
121
Voted
P2P
2007
IEEE
156views Communications» more  P2P 2007»
15 years 10 months ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt
108
Voted
HICSS
2003
IEEE
104views Biometrics» more  HICSS 2003»
15 years 9 months ago
Information Technology Investment and Adoption: A Rational Expectations Perspective
This study examines the potential applications of the Rational Expectations Hypothesis (REH) in information technology (IT) investment and adoption decisionmaking. Although REH ha...
Yoris A. Au, Robert J. Kauffman
129
Voted
ATAL
2009
Springer
15 years 10 months ago
Adversarial search with procedural knowledge heuristic
We introduce an adversarial planning algorithm based on game tree search, which is applicable in large-scale multiplayer domains. In order to tackle the scalability issues of game...
Viliam Lisý, Branislav Bosanský, Mic...
102
Voted
IPPS
2007
IEEE
15 years 10 months ago
Automatic Program Segment Similarity Detection in Targeted Program Performance Improvement
Targeted optimization of program segments can provide an additional program speedup over the highest default optimization level, such as -O3 in GCC. The key challenge is how to au...
Haiping Wu, Eunjung Park, Mihailo Kaplarevic, Ying...