Sciweavers

592 search results - page 59 / 119
» Learning of personalized security settings
Sort
View
JAIR
2008
157views more  JAIR 2008»
13 years 7 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
CIKM
2011
Springer
12 years 7 months ago
Citation count prediction: learning to estimate future citations for literature
In most of the cases, scientists depend on previous literature which is relevant to their research fields for developing new ideas. However, it is not wise, nor possible, to trac...
Rui Yan, Jie Tang, Xiaobing Liu, Dongdong Shan, Xi...
ASSETS
2009
ACM
14 years 2 months ago
ClassInFocus: enabling improved visual attention strategies for deaf and hard of hearing students
Deaf and hard of hearing students must juggle their visual attention in current classroom settings. Managing many visual sources of information (instructor, interpreter or caption...
Anna Carpenter Cavender, Jeffrey P. Bigham, Richar...
AAAI
2008
13 years 10 months ago
Multimodal People Detection and Tracking in Crowded Scenes
This paper presents a novel people detection and tracking method based on a multi-modal sensor fusion approach that utilizes 2D laser range and camera data. The data points in the...
Luciano Spinello, Rudolph Triebel, Roland Siegwart
CSFW
2010
IEEE
13 years 11 months ago
Required Information Release
Abstract—Many computer systems have a functional requirement to release information. Such requirements are an important part of a system’s information security requirements. Cu...
Stephen Chong