Sciweavers

108 search results - page 10 / 22
» Why Is this User Asking so Many Questions
Sort
View
WWW
2003
ACM
14 years 8 months ago
Social Network Extraction of Conference Participants
In a ubiquitous computing environment, it is desirable to provide a user with information depending on a user's situation, such as time, location, user behavior, and social c...
Hironori Tomobe, Kôiti Hasida, Mitsuru Ishiz...
CIE
2007
Springer
14 years 1 months ago
The Complexity Ecology of Parameters: An Illustration Using Bounded Max Leaf Number
In the framework of parameterized complexity, exploring how one parameter affects the complexity of a different parameterized (or unparameterized problem) is of general interest....
Michael R. Fellows, Frances A. Rosamond
CHI
2011
ACM
12 years 11 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
14 years 1 months ago
Research on Task Complexity as a Foundation for Augmented Cognition
In order to implement real-time adaptive augmented cognition, one of the focal points of our present research involves understanding the dimensions of task complexity. Task comple...
Martha E. Crosby, Marie Iding, David N. Chin
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 2 months ago
Challenges in Health Informatics
Early grand challenge papers in health informatics identified numerous challenges, many of which either remain as open questions or have been resolved within fairly narrow domains...
Michael A. Shepherd