Sciweavers

2259 search results - page 394 / 452
» Mining Actionable Patterns
Sort
View
114
Voted
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
15 years 7 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
PROMS
2001
Springer
92views Multimedia» more  PROMS 2001»
15 years 7 months ago
Providing VCR Functionality in Staggered Video Broadcasting
A true video-on-demand(TVOD) system lets users view any video program, at any time, and perform any VCR functions, but its peruser video delivery cost is too expensive. A near vide...
Jin B. Kwon, Heon Young Yeom
ECCV
2010
Springer
15 years 6 months ago
An eye fixation database for saliency detection in images
To learn the preferential visual attention given by humans to specific image content, we present NUSEF- an eye fixation database compiled from a pool of 758 images and 75 subjects....
CEC
2009
IEEE
15 years 6 months ago
A model for intrinsic artificial development featuring structural feedback and emergent growth
Abstract--A model for intrinsic artificial development is introduced in this paper. The proposed model features a novel mechanism where growth emerges, rather than being triggered ...
Martin Trefzer, Tüze Kuyucu, Julian Francis M...
DPPI
2007
ACM
15 years 6 months ago
My agent as myself or another: effects on credibility and listening to advice
Abstract. People consider other people who resemble them to be more persuasive. Users may consider embodied conversational agents, or ECAs, to be more persuasive if the agents rese...
Ian Li, Jodi Forlizzi, Anind K. Dey, Sara B. Kiesl...