Sciweavers

15351 search results - page 2718 / 3071
» The information bottleneck method
Sort
View
IWC
2000
81views more  IWC 2000»
15 years 4 months ago
Steps to take before intelligent user interfaces become real
Intelligent user interfaces have been proposed as a means to overcome some of the problems that directmanipulation interfaces cannot handle, such as: information overflow problems...
Kristina Höök
119
Voted
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 4 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
JHSN
2000
172views more  JHSN 2000»
15 years 4 months ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...
JUCS
2000
117views more  JUCS 2000»
15 years 4 months ago
The Light Control Case Study: Problem Description
: This document contains a range of needs and requirements concerning the construction of a light control system for a floor of a university building. A description of the building...
Stefan Queins, Gerhard Zimmermann, Martin Becker, ...
ML
2000
ACM
150views Machine Learning» more  ML 2000»
15 years 4 months ago
Adaptive Retrieval Agents: Internalizing Local Context and Scaling up to the Web
This paper discusses a novel distributed adaptive algorithm and representation used to construct populations of adaptive Web agents. These InfoSpiders browse networked information ...
Filippo Menczer, Richard K. Belew
« Prev « First page 2718 / 3071 Last » Next »