Sciweavers

629 search results - page 110 / 126
» Providing Justifications in Recommender Systems
Sort
View
CCS
2008
ACM
13 years 12 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
JAMIA
2011
94views more  JAMIA 2011»
13 years 4 months ago
Challenges in ethics, safety, best practices, and oversight regarding HIT vendors, their customers, and patients: a report of an
The current commercial health information technology (HIT) arena encompasses a number of competing firms that provide electronic health applications to hospitals, clinical practi...
Kenneth W. Goodman, Eta S. Berner, Mark A. Dente, ...
WWW
2003
ACM
14 years 10 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
IAAI
2003
13 years 11 months ago
A Cellular Telephone-Based Application for Skin-Grading to Support Cosmetic Sales
We have developed a sales support system for door-todoor sales of cosmetics based on a skin-image grading system called Skin-CRM (Skin Customer Relationship Management). Our Skin-...
Hironori Hiraishi, Fumio Mizoguchi
JBI
2006
140views Bioinformatics» more  JBI 2006»
13 years 10 months ago
Chester: Towards a personal medication advisor
Dialogue systems for health communication hold out the promise of providing intelligent assistance to patients through natural interfaces that require no training to use. But in o...
James F. Allen, George Ferguson, Nate Blaylock, Do...