Sciweavers

415 search results - page 73 / 83
» Identifying web spam with user behavior analysis
Sort
View
CHI
2003
ACM
14 years 9 months ago
The mad hatter's cocktail party: a social mobile audio space supporting multiple simultaneous conversations
This paper presents a mobile audio space intended for use by gelled social groups. In face-to-face interactions in such social groups, conversational floors change frequently, e.g...
Paul M. Aoki, Matthew Romaine, Margaret H. Szymans...
SCP
2008
76views more  SCP 2008»
13 years 8 months ago
Garbage collection: Java application servers' Achilles heel
Java application servers are gaining popularity as a way for businesses to conduct day-to-day operations. While strong emphasis has been placed on how to obtain peak performance, ...
Feng Xian, Witawas Srisa-an, Hong Jiang
ICMI
2010
Springer
217views Biometrics» more  ICMI 2010»
13 years 6 months ago
Focusing computational visual attention in multi-modal human-robot interaction
Identifying verbally and non-verbally referred-to objects is an important aspect of human-robot interaction. Most importantly, it is essential to achieve a joint focus of attentio...
Boris Schauerte, Gernot A. Fink
QEST
2009
IEEE
14 years 3 months ago
Recent Extensions to Traviando
—Traviando is a trace analyzer and visualizer for simulation traces of discrete event dynamic systems. In this paper, we briefly outline recent extensions of Traviando towards a...
Peter Kemper
MIDDLEWARE
2005
Springer
14 years 2 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan