Sciweavers

4004 search results - page 59 / 801
» How Many Packets Can We Encode
Sort
View
PERSUASIVE
2007
Springer
14 years 4 months ago
The Behavior Chain for Online Participation: How Successful Web Services Structure Persuasion
The success of many online services today depends on the company’s ability to persuade users to take specific actions, such as registering or inviting friends. We examined over 5...
B. J. Fogg, Dean Eckles
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 4 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
ICMLA
2010
13 years 8 months ago
Nonlinear Dynamical Multi-Scale Model of Associative Memory
How can we get such reliable behavior from the mind when the brain is made up of such unreliable elements as neurons? We propose that the answer is related to the emergence of stab...
Alexander M. Duda, Stephen E. Levinson
CPAIOR
2009
Springer
14 years 4 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
ECAI
2004
Springer
14 years 3 months ago
Avatars That Learn How to Behave
It is possible to model avatars that learn to simulate object manipulations and other complex actions. A number of applications may benefit from this technique including safety, e...
Adam Szarowicz, Paolo Remagnino