Sciweavers

1012 search results - page 181 / 203
» What Robots Can Do
Sort
View
WWW
2005
ACM
16 years 5 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
WWW
2004
ACM
16 years 5 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
MOBIHOC
2005
ACM
16 years 4 months ago
Inducing spatial clustering in MAC contention for spread spectrum ad hoc networks
This paper proposes a new principle for designing MAC protocols for spread spectrum based ad hoc networks ? inducing spatial clustering in contending transmitters/receivers. We fi...
Xiangying Yang, Gustavo de Veciana
VL
1997
IEEE
198views Visual Languages» more  VL 1997»
15 years 8 months ago
Behavior Processors: Layers between End-Users and Java Virtual Machines
Visual programming approaches are limited in their usefulness if they do not include a profile of their users that defines exactly who is attempting to solve what kind of problems...
Alexander Repenning, Andri Ioannidou
BCSHCI
2007
15 years 5 months ago
Design, use and experience of e-learning systems
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
Willem-Paul Brinkman, Annette Payne, Nayna Patel, ...