Sciweavers

806 search results - page 110 / 162
» A Practitioners
Sort
View
INTERACT
2007
14 years 10 days ago
Recognising Erroneous and Exploratory Interactions
A better understanding of “human error” is needed to help overcome problems of people assuming they are to blame for their inability to use poorly designed technology. In order...
Jonathan Back, Ann Blandford, Paul Curzon
NIPS
2008
14 years 10 days ago
Relative Performance Guarantees for Approximate Inference in Latent Dirichlet Allocation
Hierarchical probabilistic modeling of discrete data has emerged as a powerful tool for text analysis. Posterior inference in such models is intractable, and practitioners rely on...
Indraneel Mukherjee, David M. Blei
SDM
2008
SIAM
138views Data Mining» more  SDM 2008»
14 years 10 days ago
Clustering from Constraint Graphs
In constrained clustering it is common to model the pairwise constraints as edges on the graph of observations. Using results from graph theory, we analyze such constraint graphs ...
Ari Freund, Dan Pelleg, Yossi Richter
AVI
2004
14 years 9 days ago
Fishnet, a fisheye web browser with search term popouts: a comparative evaluation with overview and linear view
Fishnet is a web browser that always displays web pages in their entirety, independent of their size. Fishnet accomplishes this by using a fisheye view, i.e. by showing a focus re...
Patrick Baudisch, Bongshin Lee, Libby Hanna
AIM
2006
14 years 9 days ago
Developing a framework for analyzing IS/IT backsourcing
: Companies implementing an IS/IT backsourcing strategy (i.e. bringing IT functions back in-house after they have been outsourced) aiming at increasing operational effectiveness ma...
Jacky Akoka, Isabelle Comyn-Wattiau