Sciweavers

1683 search results - page 290 / 337
» A Needed Narrowing Strategy
Sort
View
CHI
2009
ACM
14 years 10 months ago
Squidy: a zoomable design environment for natural user interfaces
We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a ...
Harald Reiterer, Roman Rädle, Werner A. K&oum...
COORDINATION
2009
Springer
14 years 10 months ago
Hop, a Fast Server for the Diffuse Web
The diffuse Web is an alternative way of using the Web 2.0 infrastructure for building personal diffuse applications. Systems that let users tune the temperature of their house wit...
Manuel Serrano
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
14 years 10 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
14 years 10 months ago
Efficiently learning the accuracy of labeling sources for selective sampling
Many scalable data mining tasks rely on active learning to provide the most useful accurately labeled instances. However, what if there are multiple labeling sources (`oracles...
Pinar Donmez, Jaime G. Carbonell, Jeff Schneider
KDD
2007
ACM
151views Data Mining» more  KDD 2007»
14 years 10 months ago
Efficient mining of iterative patterns for software specification discovery
Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggrava...
Chao Liu 0001, David Lo, Siau-Cheng Khoo