Sciweavers

1022 search results - page 162 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
DCOSS
2010
Springer
14 years 16 days ago
Programming Sensor Networks Using Remora Component Model
Abstract. The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree...
Amirhosein Taherkordi, Frédéric Loir...
ICMI
2000
Springer
171views Biometrics» more  ICMI 2000»
13 years 11 months ago
Gaze and Speech in Attentive User Interfaces
The trend toward pervasive computing necessitates finding and implementing appropriate ways for users to interact with devices. We believe the future of interaction with pervasive ...
Paul P. Maglio, Teenie Matlock, Christopher S. Cam...
WWW
2006
ACM
14 years 8 months ago
Large-scale text categorization by batch mode active learning
Large-scale text categorization is an important research topic for Web data mining. One of the challenges in large-scale text categorization is how to reduce the amount of human e...
Steven C. H. Hoi, Rong Jin, Michael R. Lyu
ITICSE
2010
ACM
14 years 1 days ago
PhidgetLab: crossing the border from virtual to real-world objects
Teaching pupils the ideas behind objects in programming languages can be difficult since these concepts are mostly and not comprehensible at first sight. Etoys as a visual progra...
Michael Haupt, Michael Perscheid, Robert Hirschfel...
DAC
2008
ACM
14 years 8 months ago
Cache modeling in probabilistic execution time analysis
Multimedia-dominated consumer electronics devices (such as cellular phone, digital camera, etc.) operate under soft real-time constraints. Overly pessimistic worst-case execution ...
Yun Liang, Tulika Mitra