Sciweavers

106 search results - page 20 / 22
» Using relative novelty to identify useful temporal abstracti...
Sort
View
UMUAI
1998
157views more  UMUAI 1998»
13 years 7 months ago
Bayesian Models for Keyhole Plan Recognition in an Adventure Game
We present an approach to keyhole plan recognition which uses a dynamic belief (Bayesian) network to represent features of the domain that are needed to identify users’ plans and...
David W. Albrecht, Ingrid Zukerman, Ann E. Nichols...
ICDE
2006
IEEE
207views Database» more  ICDE 2006»
14 years 8 months ago
Automatic Sales Lead Generation from Web Data
Speed to market is critical to companies that are driven by sales in a competitive market. The earlier a potential customer can be approached in the decision making process of a p...
Ganesh Ramakrishnan, Sachindra Joshi, Sumit Negi, ...
SDMW
2004
Springer
14 years 23 days ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...
ICML
1997
IEEE
14 years 8 months ago
Characterizing the generalization performance of model selection strategies
Abstract: We investigate the structure of model selection problems via the bias/variance decomposition. In particular, we characterize the essential structure of a model selection ...
Dale Schuurmans, Lyle H. Ungar, Dean P. Foster
IIE
2006
185views more  IIE 2006»
13 years 7 months ago
ICT Teaching Experience Sharing in Higher Education: an Education Development Approach
Abstract. With the growing awareness of the scholarship of teaching and the appropriate incorporation of Information and Communications Technologies (ICT) in higher education, ther...
Jacky Wai-cheong Pow