Sciweavers

6885 search results - page 37 / 1377
» The micro-structure of use of help
Sort
View
CIKM
2010
Springer
13 years 6 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
IAT
2010
IEEE
13 years 5 months ago
Selecting Operator Queries Using Expected Myopic Gain
When its human operator cannot continuously supervise (much less teleoperate) an agent, the agent should be able to recognize its limitations and ask for help when it risks making...
Robert Cohn, Michael Maxim, Edmund H. Durfee, Sati...
IJACTAICIT
2010
176views more  IJACTAICIT 2010»
13 years 5 months ago
A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place o...
Ashwin B. K., Kumaran K., Madhu Vishwanatham V., M...
TVCG
2012
169views Hardware» more  TVCG 2012»
11 years 10 months ago
Visual Reasoning about Social Networks Using Centrality Sensitivity
—In this paper, we study the sensitivity of centrality metrics as a key metric of social networks to support visual reasoning. As centrality represents the prestige or importance...
Carlos D. Correa, Tarik Crnovrsanin, Kwan-Liu Ma
VSGAMES
2010
129views Game Theory» more  VSGAMES 2010»
13 years 6 months ago
Validation of Serious Games Attributes Using the Technology Acceptance Model
—The paper introduces a conceptual model for the design of serious games and uses the Technology Acceptance Model (TAM) for its validation. A specially developed game introduced ...
Amri Yusoff, Richard Crowder, Lester Gilbert