Sciweavers

592 search results - page 88 / 119
» Learning of personalized security settings
Sort
View
INFOSCALE
2007
ACM
13 years 9 months ago
Citation data clustering for author name disambiguation
In this paper, we propose a new method of citation data clustering for author name disambiguation. Most citation data appearing in the reference section of scientific papers incl...
Tomonari Masada, Atsuhiro Takasu, Jun Adachi
ICCE
2007
114views Education» more  ICCE 2007»
13 years 9 months ago
Investigating the Reuse of Course Generation Knowledge
: Course generation knowledge, i.e., how to assemble a sequence of learning objects which is adapted to a learner’s goals, competencies and preferences, is hard to assess and exp...
Carsten Ullrich, Qinghua Chen, Sushing Chen, Lipin...
CISSE
2008
Springer
13 years 8 months ago
Secondary Emotions Deduction from Context
— Human centred services are increasingly common in the market of mobile devices. However, affective aware services are still scarce. In turn, the recognition of secondary emotio...
Kuderna-Iulian Benta, Marcel Cremene, Nicoleta Ram...
IJET
2008
108views more  IJET 2008»
13 years 7 months ago
Moving towards a Fully Automatic Knowledge Assessment Tool
Information about a student's level or state of knowledge is a key aspect for efficient, personalized learning activities. E-learning systems gain such information in two ways...
Christian Guetl
IJCV
2000
136views more  IJCV 2000»
13 years 7 months ago
A Trainable System for Object Detection
This paper presents a general, trainable system for object detection in unconstrained, cluttered scenes. The system derives much of its power from a representation that describes a...
Constantine Papageorgiou, Tomaso Poggio