Results 291 to 300 of about 8,678,005 (362)
Some of the next articles are maybe not open access.

Users: Service Users and the Drug User Movement

2010
In April 2006 a group of illegal drug user activists from around the world met at the 17th International Conference on the Reduction of Drug Related Harm in Vancouver, Canada. Together they produced a ‘statement about the international network of people who use drugs’, a document that is, in effect, an international declaration of drug users’ rights ...
Alex Mold, Virginia Berridge
openaire   +1 more source

Jointly positioning multiple users in aid of user-to-user distances

2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017
A multiuser positioning algorithm in aid of user-to-user (U2U) distances is proposed in this paper. The cost function is the combination of non-linear least squares (NLS) of time of arrival (TOA) of multiple users and the NLS of U2U distances among users. Particle swarm optimization (PSO) is applied to search the best positions of the multiple users in
Yi Wang 0018, Beihua Wu, Zhenyu Shi
openaire   +1 more source

A User-Centered Approach to User Modeling [PDF]

open access: possible, 1999
Generally, user modeling concerns a person interacting with a standing console. This scenario does not represent the Hyper Audio system in use: a visitor freely moves in a museum, gathering information from an adaptive and portable electronic guide. To provide designers with presumptive user behavior, data about visitor profiles and visit styles were ...
D. Petrelli   +2 more
openaire   +1 more source

User Equilibrium with Length Constrained Users

2012 Fifth International Joint Conference on Computational Sciences and Optimization, 2012
In this paper we introduce a length constrained user equilibrium model. In our model, people consider two criteria, path time and path length, when selecting their routes. They only travel on "acceptable paths", the paths whose length are not too long for them.
Bojian Zhou, Xuhong Li
openaire   +1 more source

Understanding the User

Proceedings of the 2017 ACM Symposium on Document Engineering, 2017
Document engineering is all about building systems and tools that allow people to work with documents and document collections. A key aspect is the usefulness and usability of these tools. In this tutorial, we will look at the many different kinds of user studies and user evaluations that can be used to inform the design and improve utility and ...
Kim Marriott   +2 more
openaire   +1 more source

Semi-Supervised Learning for Cross-Domain Recommendation to Cold-Start Users

International Conference on Information and Knowledge Management, 2019
Providing accurate recommendations to newly joined users (or potential users, so-called cold-start users) has remained a challenging yet important problem in recommender systems.
SeongKu Kang   +3 more
semanticscholar   +1 more source

A Comparison of Marijuana Users and Non-users

Nature, 1970
Interviews with sixty-two Americans in their twenties, mostly students, demonstrate that those who smoked marijuana moderately differed little in personality from those who did not indulge, but that heavy smokers of marijuana were rather less conventional. The smokers tended to drink little alcohol.
N E, Zinberg, A T, Weil
openaire   +2 more sources

User cube: a taxonomy of end users

Communications of the ACM, 1989
The user cube, a precise and comprehensive graphical taxonomy designed to provide a common base for understanding and classifying end users in organizations, can be used to assess the risks associated with end-user computing.
William W. Cotterman, Kuldeep Kumar
openaire   +1 more source

Users

Social Media Data Mining and Analytics, 2018
The Welcome Email you received upon subscribing to CONTENTdm references an initial system administrator account, created from an OCLC LDAP account, with all available server and collection rights.
Negin Golrezaei
semanticscholar   +1 more source

User Authentication Based on Representative Users

IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2012
User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking since stolen usernames and passwords can be exploited to impersonate legitimate users in order to commit malicious activity. Biometric authentication incorporates additional user characteristics such
Alon Schclar   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy