Sciweavers

83 search results - page 11 / 17
» User Experiences and Impressions of Recommenders in Complex ...
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 1 months ago
Mental Models of Security Risks
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Farzaneh Asgharpour, Debin Liu, L. Jean Camp
CIKM
2004
Springer
14 years 1 months ago
RStar: an RDF storage and query system for enterprise resource management
Modern corporations operate in an extremely complex environment and strongly depend on all kinds of information resources across the enterprise. Unfortunately, with the growth of ...
Li Ma, Zhong Su, Yue Pan, Li Zhang, Tao Liu
CHI
2005
ACM
14 years 8 months ago
Wizard of Oz interfaces for mixed reality applications
One important tool for developing complex interactive applications is "Wizard of Oz" (WOz) simulation. WOz simulation allows design concepts, content and partially compl...
Steven Dow, Jaemin Lee, Christopher Oezbek, Blair ...
PRL
2007
138views more  PRL 2007»
13 years 7 months ago
Ent-Boost: Boosting using entropy measures for robust object detection
Recently, boosting has come to be used widely in object-detection applications because of its impressive performance in both speed and accuracy. However, learning weak classifier...
Duy-Dinh Le, Shin'ichi Satoh
JNCA
2006
114views more  JNCA 2006»
13 years 7 months ago
An evolutionary approach to prototyping pedagogical agents: from simulation to integrated system
We have developed and integrated software agents with two educational groupware systems (TeamWave Workplace and FLE), using evolutionary prototyping and empiricalbased design as d...
Anders I. Mørch, Jan A. Dolonen, Jan Eirik ...