Sciweavers

299 search results - page 21 / 60
» Planning with h in Theory and Practice
Sort
View
CHI
2010
ACM
14 years 2 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
WWW
2011
ACM
13 years 2 months ago
A politeness recognition tool for Hindi: with special emphasis on online texts
This paper gives an overview of a politeness recognition tool (PoRT) for Hindi that is currently under preparation. It describes the the kind of problems that need to be tackled w...
Ritesh Kumar
ICOM
2011
12 years 11 months ago
A Context-Aware Proactive Controller for Smart Environments
In this paper we describe an implicit user interface for smart environment control: We make our system guess how to assist the user(s) proactively. Our controller is based on two ...
Frank Krüger, Gernot Ruscher, Sebastian Bader...
KDD
2003
ACM
124views Data Mining» more  KDD 2003»
14 years 8 months ago
Information-theoretic co-clustering
Two-dimensional contingency or co-occurrence tables arise frequently in important applications such as text, web-log and market-basket data analysis. A basic problem in contingenc...
Inderjit S. Dhillon, Subramanyam Mallela, Dharmend...
ICCD
1999
IEEE
91views Hardware» more  ICCD 1999»
14 years 1 hour ago
Architectural Synthesis of Timed Asynchronous Systems
ions", in IEEE Transactions on CAD of VLSI, 25(3):403-412, March, 2006. , E. Mercer, C. Myers, "Modular Verification of Timed Systems Using Automatic Abstraction" in...
Brandon M. Bachman, Hao Zheng, Chris J. Myers