Sciweavers

521 search results - page 73 / 105
» Specialization Patterns
Sort
View
OTM
2007
Springer
14 years 4 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional beneï...
Sören Preibusch
CRV
2006
IEEE
130views Robotics» more  CRV 2006»
14 years 4 months ago
Determining Shot Accuracy of a Robotic Pool System
A process is described to determine the shot accuracy of an automatic robotic pool playing system. The system comprises a ceiling-mounted gantry robot, a special purpose cue end-e...
Joseph Lam, Fei Long, Gerhard Roth, Michael A. Gre...
ICDM
2006
IEEE
134views Data Mining» more  ICDM 2006»
14 years 3 months ago
Fast Frequent Free Tree Mining in Graph Databases
Free tree, as a special graph which is connected, undirected and acyclic, is extensively used in domains such as computational biology, pattern recognition, computer networks, XML...
Peixiang Zhao, Jeffrey Xu Yu
NORDICHI
2006
ACM
14 years 3 months ago
Systematic evaluation of e-learning systems: an experimental validation
The evaluation of e-learning applications deserves special attention and evaluators need effective methodologies and appropriate guidelines to perform their task. We have proposed...
Carmelo Ardito, Maria Francesca Costabile, Antonel...
INFOCOM
2005
IEEE
14 years 3 months ago
Farsighted users harness network time-diversity
Abstract— Fluctuations in network conditions are a common phenomenon. They arise in the current wired Internet due to changes in demand, and in wireless networks due to changing ...
Peter B. Key, Laurent Massoulié, Milan Vojn...