Sciweavers

3193 search results - page 604 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
WWW
2007
ACM
14 years 8 months ago
Why we search: visualizing and predicting user behavior
The aggregation and comparison of behavioral patterns on the WWW represent a tremendous opportunity for understanding past behaviors and predicting future behaviors. In this paper...
Eytan Adar, Daniel S. Weld, Brian N. Bershad, Stev...
CHI
2009
ACM
14 years 8 months ago
Leveraging open-source software in the design and development process
This paper presents a case study of the NASA Ames Research Center HCI Group's design and development of a problem reporting system for NASA's next generation vehicle (to...
Collin Green, Irene Tollinger, Christian Ratterman...
PPDP
2009
Springer
14 years 2 months ago
Relational semantics for effect-based program transformations: higher-order store
We give a denotational semantics to a type and effect system tracking reading and writing to global variables holding values that may include higher-order effectful functions. Reļ...
Nick Benton, Andrew Kennedy, Lennart Beringer, Mar...
3DPVT
2006
IEEE
145views Visualization» more  3DPVT 2006»
14 years 1 months ago
The Recursive Multi-Frame Planar Parallax Algorithm
This paper presents a method for obtaining accurate dense elevation and appearance models of terrain using a single camera on-board an aerial platform. Applications of this method...
Christopher Geyer, Todd Templeton, Marci Meingast,...
SIGIR
2006
ACM
14 years 1 months ago
Feature diversity in cluster ensembles for robust document clustering
The performance of document clustering systems depends on employing optimal text representations, which are not only diļ¬ƒcult to determine beforehand, but also may vary from one ...
Xavier Sevillano, Germán Cobo, Francesc Al&...