Sciweavers

446 search results - page 73 / 90
» Modeling trust in e-commerce: an approach based on user requ...
Sort
View
SIGUCCS
2003
ACM
14 years 2 months ago
Regaining single sign-on taming the beast
It has been our effort at Ringling school to provide our campus community with the capability to uniformly access resources across multiple platforms. Empowering the user with a s...
Divyangi Anchan, Mahmoud Pegah
KI
2002
Springer
13 years 8 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
MOBISYS
2005
ACM
14 years 8 months ago
Reincarnating PCs with portable SoulPads
The ability to walk up to any computer, personalize it, and use it as one's own has long been a goal of mobile computing research. We present SoulPad, a new approach based on...
Ramón Cáceres, Casey Carter, Chandra...
TSE
2008
113views more  TSE 2008»
13 years 8 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
JUCS
2007
84views more  JUCS 2007»
13 years 8 months ago
Formal Representations of Learning Scenarios: A Methodology to Configure E-Learning Systems
: Nowadays, advanced E-Learning systems are generally pedagogy-aware. Commonly, these systems include facilities for defining so-called learning scenarios that reflect sophisticate...
Denis Helic