Sciweavers

8760 search results - page 1728 / 1752
» Modeling users of intelligent systems
Sort
View
160
Voted
IFIP12
2004
15 years 5 months ago
An Agency for Semantic-Based Automatic Discovery of Web Services
With the evolution of Web service technology, services will not only become increasingly sophisticated, but also move into the area of business-to-consumer and peer-to-peer interac...
Simona Colucci, Tommaso Di Noia, Eugenio Di Sciasc...
128
Voted
DLOG
2003
15 years 5 months ago
Relationships with other Formalisms
In this chapter, we are concerned with the relationship between Description Logics and other formalisms, regardless of whether they were designed for knowledge representation issu...
Ulrike Sattler, Diego Calvanese, Ralf Molitor
154
Voted
MOBICOM
2010
ACM
15 years 4 months ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng
152
Voted
UMUAI
2008
192views more  UMUAI 2008»
15 years 3 months ago
Automatic detection of learner's affect from conversational cues
We explored the reliability of detecting a learner's affect from conversational features extracted from interactions with AutoTutor, an intelligent tutoring system that helps...
Sidney K. D'Mello, Scotty D. Craig, Amy M. Withers...
144
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
« Prev « First page 1728 / 1752 Last » Next »