Sciweavers

448 search results - page 56 / 90
» Who is in Control
Sort
View
138
Voted
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
15 years 10 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
109
Voted
HRI
2009
ACM
15 years 10 months ago
Footing in human-robot conversations: how robots might shape participant roles using gaze cues
During conversations, speakers establish their and others’ participant roles (who participates in the conversation and in what capacity)—or “footing” as termed by Goffman...
Bilge Mutlu, Toshiyuki Shiwa, Takayuki Kanda, Hiro...
125
Voted
MUM
2009
ACM
190views Multimedia» more  MUM 2009»
15 years 10 months ago
Handy feedback: connecting smart meters with mobile phones
Reducing their energy consumption has become an important objective for many people. Consumption transparency and timely feedback are essential to support those who want to adjust...
Markus Weiss, Friedemann Mattern, Tobias Graml, Th...
110
Voted
SASO
2009
IEEE
15 years 10 months ago
Swarming Geographic Event Profiling, Link Analysis, and Prediction
Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Sven A. Brueckner
140
Voted
IPPS
2009
IEEE
15 years 10 months ago
Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks
In P2P file sharing systems, free-riders who use others’ resources without sharing their own cause system-wide performance degradation. Existing techniques to counter freerider...
Kyuyong Shin, Douglas S. Reeves, Injong Rhee