Sciweavers

377 search results - page 56 / 76
» Know the Right People
Sort
View
IJMMS
2006
72views more  IJMMS 2006»
13 years 7 months ago
The use of interface agents for email notification in critical incidents
This study reports on several typical scenarios of the use of email notification interface agents under the influence of critical incidents. An interface agent is a reactive, coll...
Alexander Serenko
PR
2006
98views more  PR 2006»
13 years 7 months ago
Rule-based cleanup of on-line English ink notes
Recently, many pen-based devices have enabled people to input digital ink naturally. Often, there is smear and correction when writing. This not only makes the document dirty and ...
Zhouchen Lin, Rongrong Wang, Heung-Yeung Shum
RAS
2006
100views more  RAS 2006»
13 years 7 months ago
Sampling and node adding in probabilistic roadmap planners
The probabilistic roadmap approach is one of the leading motion planning techniques. Over the past decade the technique has been studied by many different researchers. This has le...
Roland Geraerts, Mark H. Overmars
IJMMS
2007
75views more  IJMMS 2007»
13 years 7 months ago
Internet users' perceptions of 'privacy concerns' and 'privacy actions'
A consistent finding reported in online privacy research is that an overwhelming majority of people are ‘concerned’ about their privacy when they use the Internet. Therefore,...
Carina Paine, Ulf-Dietrich Reips, Stefan Stieger, ...
IPM
2007
123views more  IPM 2007»
13 years 7 months ago
Using query logs to establish vocabularies in distributed information retrieval
Users of search engines express their needs as queries, typically consisting of a small number of terms. The resulting search engine query logs are valuable resources that can be ...
Milad Shokouhi, Justin Zobel, Seyed M. M. Tahaghog...