Sciweavers

1092 search results - page 56 / 219
» Understanding Context Before Using It
Sort
View
CHI
2008
ACM
14 years 8 months ago
A diary study of mobile information needs
Being mobile influences not only the types of information people seek but also the ways they attempt to access it. Mobile contexts present challenges of changing location and soci...
Timothy Sohn, Kevin A. Li, William G. Griswold, Ja...
USS
2008
13 years 10 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
ICMI
2005
Springer
136views Biometrics» more  ICMI 2005»
14 years 1 months ago
Probabilistic grounding of situated speech using plan recognition and reference resolution
Situated, spontaneous speech may be ambiguous along acoustic, lexical, grammatical and semantic dimensions. To understand such a seemingly difficult signal, we propose to model th...
Peter Gorniak, Deb Roy
IJCNN
2007
IEEE
14 years 2 months ago
The Improved Correlation Matrix Memory (CMML)
—This paper examines the motivation and concepts of dynamic encoders (for binary neural networks) introduced by Shah in the author’s RASC 2004 and 2006 conference papers [1], [...
Nimish Shah, Simon O'Keefe, Jim Austin
HT
2004
ACM
14 years 1 months ago
Experiences migrating microcosm learning materials
Microcosm was an open hypertext system that evolved in the early 1990s, before the advent of the Web. Apart from its success as a research platform it was widely used for presenti...
H. C. Davis, R. A. Bacon