Sciweavers

758 search results - page 88 / 152
» User Control over User Adaptation: A Case Study
Sort
View
218
Voted
ICONFERENCE
2011
14 years 10 months ago
Lifting the veil: the expression of values in online communities
Wikipedia’s stated mission is to provide a free encyclopedia that people all over the world can use and contribute to. However, while Wikipedia is successful at providing access...
Jonathan T. Morgan, Robert M. Mason, Karine Nahon
117
Voted
GECCO
2008
Springer
159views Optimization» more  GECCO 2008»
15 years 4 months ago
IGAP: interactive genetic algorithm peer to peer
We present IGAP, a peer to peer interactive genetic algorithm which reflects the real world methodology followed in team design. We apply our methodology to floorplanning. Throu...
Juan C. Quiroz, Amit Banerjee, Sushil J. Louis
157
Voted
JCP
2007
159views more  JCP 2007»
15 years 3 months ago
Authoring of Units of Learning via Dialogue Systems
— Detailed and expressive e-learning specifications like IMS LD [1] are necessary to create efficient e-learning applications. E-learning specifications that meet these demand...
Dietmar Janetzko
130
Voted
SACMAT
2010
ACM
15 years 2 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
133
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Receiver-Driven Bandwidth Sharing for TCP
— Applications using TCP, such as web-browsers, ftp, and various P2P programs, dominate most of the Internet traffic today. In many cases the last-hop access links are bottlenec...
Puneet Mehra, Christophe De Vleeschouwer, Avideh Z...