Sciweavers

1454 search results - page 148 / 291
» Modeling User Affect from Causes and Effects
Sort
View
142
Voted
AIHC
2007
Springer
15 years 10 months ago
Human Computing and Machine Understanding of Human Behavior: A Survey
A widely accepted prediction is that computing will move to the background, weaving itself into the fabric of our everyday living spaces and projecting the human user into the for...
Maja Pantic, Alex Pentland, Anton Nijholt, Thomas ...
ICDCS
2000
IEEE
15 years 8 months ago
An Adaptive, Perception-Driven Error Spreading Scheme in Continuous Media Streaming
For transmission of continuous media (CM) streams such as audio and video over the Internet, a critical issue is that periodic network overloads cause bursty packet losses. Studie...
Srivatsan Varadarajan, Hung Q. Ngo, Jaideep Srivas...
144
Voted
ASE
2006
78views more  ASE 2006»
15 years 4 months ago
Using software evolution to focus architectural recovery
Ideally, a software project commences with requirements gathering and specification, reaches its major milestone with system implementation and delivery, and then continues, possi...
Nenad Medvidovic, Vladimir Jakobac
INFOVIS
1999
IEEE
15 years 8 months ago
Visualizing Application Behavior on Superscalar Processors
The advent of superscalar processors with out-of-order execution makes it increasingly difficult to determine how well an application is utilizing the processor and how to adapt t...
Chris Stolte, Robert Bosch, Pat Hanrahan, Mendel R...
DMIN
2009
222views Data Mining» more  DMIN 2009»
15 years 1 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan