Sciweavers

194 search results - page 29 / 39
» Learning whom to trust: using graphical models for learning ...
Sort
View
EUROCON
2011
281views Hardware» more  EUROCON 2011»
12 years 11 months ago
Browsing videos by automatically detected audio events
—This paper focuses on Audio Event Detection (AED), a research area which aims to substantially enhance the access to audio in multimedia content. With the ever-growing quantity ...
Virginia Barbosa, Thomas Pellegrini, Miguel Bugalh...
DMIN
2006
131views Data Mining» more  DMIN 2006»
13 years 8 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 1 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
CAISE
2009
Springer
14 years 2 months ago
TomTom for Business Process Management (TomTom4BPM)
Navigation systems have proven to be quite useful for many drivers. People increasingly rely on the devices of TomTom and other vendors and find it useful to get directions to go ...
Wil M. P. van der Aalst
WWW
2006
ACM
14 years 8 months ago
Reappraising cognitive styles in adaptive web applications
The mechanisms for personalisation used in web applications are currently the subject of much debate amongst researchers from many diverse subject areas. One of the most contempor...
Adam Moore, Elizabeth J. Brown, Helen Ashman, Tim ...