Sciweavers

1583 search results - page 109 / 317
» Probabilistic User Behavior Models
Sort
View
ACMSE
2010
ACM
13 years 6 months ago
Mobile web search personalization using ontological user profile
Most present day search engines have a deterministic behavior in the sense that they return the same search results for all users who submit the same query at a certain time. They...
Kapil Goenka, Ismailcem Budak Arpinar, Mustafa Nur...
INFOCOM
2007
IEEE
14 years 2 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
13 years 11 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
GLOBECOM
2006
IEEE
14 years 2 months ago
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users
— Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willin...
George Theodorakopoulos, John S. Baras
COMCOM
2004
127views more  COMCOM 2004»
13 years 8 months ago
Traffic splitting in a network: split traffic models and applications
The contemporary high-speed networks, e.g. the Internet and asynchronous transfer mode (ATM) networks provide a convenient and cost-effective communication platform to carry the e...
Huei-Wen Ferng, Cheng-Ching Peng