Sciweavers

1583 search results - page 231 / 317
» Probabilistic User Behavior Models
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
KI
2008
Springer
13 years 7 months ago
Enhancing Animated Agents in an Instrumented Poker Game
In this paper we present an interactive poker game in which one human user plays against two animated agents using RFID-tagged poker cards. The game is used as a showcase to illust...
Marc Schröder, Patrick Gebhard, Marcela Charf...
JAIHC
2010
134views more  JAIHC 2010»
13 years 6 months ago
Persuasion in ambient intelligence
Although the field of persuasive technologies has lately attracted a lot of attention, only recently the notion of ambient persuasive technologies was introduced. Ambient persuasi...
Maurits Clemens Kaptein, Panos Markopoulos, Boris ...
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
14 years 1 months ago
A New Approach for Reactive Web Usage Data Processing
— Web usage mining exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web (WWW) users. The required information is captured b...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar
IUI
2009
ACM
14 years 4 months ago
Learning to generalize for complex selection tasks
Selection tasks are common in modern computer interfaces: we are often required to select a set of files, emails, data entries, and the like. File and data browsers have sorting a...
Alan Ritter, Sumit Basu