Sciweavers

685 search results - page 132 / 137
» What are you looking for
Sort
View
I3
2007
13 years 11 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
ACE
2004
193views Education» more  ACE 2004»
13 years 11 months ago
Conversational KM - Student Driven Learning
A conversational method of teaching whereby the students engage each other as a key part of the learning experience achieves a higher percentage of high grades (and presumably bet...
Marilyn A. Wells, Phillip W. Brook
NIPS
2004
13 years 11 months ago
Heuristics for Ordering Cue Search in Decision Making
Simple lexicographic decision heuristics that consider cues one at a time in a particular order and stop searching for cues as soon as a decision can be made have been shown to be...
Peter M. Todd, Anja Dieckmann
IICAI
2003
13 years 11 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
INTERACT
2003
13 years 11 months ago
Error Resolution Strategies for Interactive Television Speech Interfaces
: Using speech input to augment the remote control can be an alternative interaction technique for interactive television. However, little is known about how to design such a syste...
Aseel Berglund, Pernilla Qvarfordt