Sciweavers

8620 search results - page 1616 / 1724
» Modeling the Human in Human Factors
Sort
View
AUSDM
2006
Springer
112views Data Mining» more  AUSDM 2006»
14 years 24 days ago
The Scamseek Project - Text Mining for Financial Scams on the Internet
The Scamseek project, as commissioned by ASIC has the principal objective of building an industrially viable system that retrieves potential scam candidate documents from the Inte...
Jon Patrick
GECCO
2006
Springer
175views Optimization» more  GECCO 2006»
14 years 21 days ago
A computational theory of adaptive behavior based on an evolutionary reinforcement mechanism
Two mathematical and two computational theories from the field of human and animal learning are combined to produce a more general theory of adaptive behavior. The cornerstone of ...
J. J. McDowell, Paul L. Soto, Jesse Dallery, Saule...
ICRA
2000
IEEE
176views Robotics» more  ICRA 2000»
14 years 19 days ago
RRT-Connect: An Efficient Approach to Single-Query Path Planning
A simple and efficient randomized algorithm is presented for solving single-query path planning problems in high-dimensional configuration spaces. The method works by incrementall...
James J. Kuffner Jr., Steven M. LaValle
ICSE
2000
IEEE-ACM
14 years 19 days ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
IDMS
2000
Springer
131views Multimedia» more  IDMS 2000»
14 years 19 days ago
Spatially Aware Local Communication in the RAUM System
In this paper, we propose a new paradigm for local communication between devices in Ubiquitous Computing environments, assuming a multitude of computerized everyday appliances comm...
Felix Hupfeld, Michael Beigl
« Prev « First page 1616 / 1724 Last » Next »