Sciweavers

15379 search results - page 142 / 3076
» Protecting users from
Sort
View
VCHCI
1993
13 years 12 months ago
From Undo to Multi-User Applications
The interaction history of a document can be modelled as a tree of command objects. This model does not only support recovery (undo/redo), but is also suitable for cooperation betw...
Thomas Berlage, Andreas Genau
NAACL
2010
13 years 5 months ago
Learning Dense Models of Query Similarity from User Click Logs
The goal of this work is to integrate query similarity metrics as features into a dense model that can be trained on large amounts of query log data, in order to rank query rewrit...
Fabio De Bona, Stefan Riezler, Keith Hall, Massimi...
ICC
2007
IEEE
145views Communications» more  ICC 2007»
14 years 2 months ago
Predicting User-Perceived Quality Ratings from Streaming Media Data
Abstract—Media stream quality is highly dependent on underlying network conditions, but identifying scalable, unambiguous metrics to discern the user-perceived quality of a media...
Amy Csizmar Dalal, David R. Musicant, Jamie F. Ols...
CONEXT
2009
ACM
13 years 9 months ago
Where the sidewalk ends: extending the internet as graph using traceroutes from P2P users
An accurate Internet topology graph is important in many areas of networking, from deciding ISP business relationships to diagnosing network anomalies. Most Internet mapping effor...
Kai Chen, David R. Choffnes, Rahul Potharaju, Yan ...
HRI
2007
ACM
13 years 11 months ago
Robotic etiquette: results from user studies involving a fetch and carry task
This paper presents results, outcomes and conclusions from a series of Human Robot Interaction (HRI) trials which investigated how a robot should approach a human in a fetch and c...
Michael L. Walters, Kerstin Dautenhahn, Sarah N. W...