نتایج جستجو برای: browses

تعداد نتایج: 127  

2004
Isabel F. Cruz

As a growing amount of networked information is becoming available, the potential of a large variety of applications accessing that data in a flexible and transparent way using a single query is far reaching. Particularly important is the case where hundreds of such data sources need to be queried in geospatial, scientific, educational, and e-commerce applications. For example, in homeland secu...

2004
Janne V. Kujala Marketta Niemelä Jonathan Roberts Nadia Boukhelifa Peter Rodgers

Searching the web Searching information on the web is becoming a daily activity for many. The web is growing at a phenomenal rate; some sources say there are currently over 2.5 billion pages available and this number is increasing by 7.3 million pages per day [1,2]. Despite this complexity current search engines do an amazing job. However, search results are mostly presented in rank-ordered lis...

2010
Loïc Cerf

Useful knowledge discovery processes can be based on patterns extracted from large datasets. Designing efficient data mining algorithms to compute collections of relevant patterns is an active research domain. Many datasets record whether some properties hold for some objects, e. g., whether an item is bought by a customer or whether a gene is over-expressed in a biological sample. Such dataset...

1992
David Stotts Richard Furuta

In many hypertext systems, meaningfully traversing a document depends on capabilities, features, and navigational aids that are part of the browser implementation. For example, if a reader browses to a node that has no out links, then backing up, or \warping" to the table of contents can allow the browsing session to continue. If hyperdocuments are to become interchangeable among hypertext syst...

1997
Christopher Staff

HyperContext is a 3-layer model for adaptive hypertext. The model supports the use of multiple interpretations of objects of information. Whenever an object is accessed, HyperContext determines the context in which the access has taken place and presents the appropriate interpretation to the user. 1 Overview of Adaptive Hypertext Adaptive Hypertext Systems (AHSs) generally provide capabilities ...

2013
Lex Fridman Ariel Stolerman Sayandeep Acharya Patrick Brennan Patrick Juola Rachel Greenstadt Moshe Kam

I dentity verification for access control presents a trade-off between maximizing the probability of intruder detection and minimizing the cost for the legitimate user in terms of distractions and hardware requirements. In recent years, researchers have extensively explored behavioral biometric systems to address this challenge. 1 These systems rely on input devices, such as the keyboard and mo...

2002
Matthias Enzmann Thomas Kunz Markus Schneider

Privacy threats and problems in the context of electronic commerce are extensively discussed in literature since the discovery of the economical importance of the Internet. In academic work done so far, solutions are mostly proposed for those cases in which the trade objects are restricted to intangible goods, e.g., see [1, 2, 8]. These intangible goods —such as electronic documents, image, mus...

2006
Tadanobu Furukawa Yutaka Matsuo Tomofumi Matsuzawa Masayuki Takeda Koki Uchiyama

This study investigates Weblog users’ behavioral data on a hosting service in Japan. The study analyzes users’ behaviors, such as browsing and bookmarking, in addition to posting comments and sending trackbacks. Results of this study reveal the causes of a user’s visiting and regularly browsing behaviors, especially from a social network point of view. The correlation between the strength of tw...

Journal: :IEEE Intelligent Systems 2002
Filippo Menczer Alvaro E. Monge William Nick Street

benefits such as convenience and low prices. But such benefits are partly offset by a new cost—the time and frustration required to sift through information on innumerable vendor sites and to learn how to submit and manage orders. These tasks are difficult because the type, amount, and organization of information differ from vendor to vendor. Complicating matters, customers are unaware of chang...

2015
Kfir Eliaz Ran Spiegler

We study decentralized mechanisms for allocating firms into search pools. The pools are created in response to noisy preference signals provided by consumers, who then browse the pools via costly random sequential search. Surplus-maximizing search pools are implementable in symmetric Nash equilibrium. Full extraction of the maximal surplus is implementable if and only if the distribution of con...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید