Sciweavers

7886 search results - page 1574 / 1578
» An evaluation of bipartitioning techniques
Sort
View
KDD
2012
ACM
168views Data Mining» more  KDD 2012»
11 years 10 months ago
Mining contentions from discussions and debates
Social media has become a major source of information for many applications. Numerous techniques have been proposed to analyze network structures and text contents. In this paper,...
Arjun Mukherjee, Bing Liu 0001
SIGIR
2012
ACM
11 years 10 months ago
Improving searcher models using mouse cursor activity
Web search components such as ranking and query suggestions analyze the user data provided in query and click logs. While this data is easy to collect and provides information abo...
Jeff Huang, Ryen W. White, Georg Buscher, Kuansan ...
CVPR
2012
IEEE
11 years 10 months ago
Classifying covert photographs
The advances in image acquisition techniques make recording images never easier and brings a great convenience to our daily life. It raises at the same time the issue of privacy p...
Haitao Lang, Haibin Ling
TVCG
2012
210views Hardware» more  TVCG 2012»
11 years 10 months ago
A 2D Flow Visualization User Study Using Explicit Flow Synthesis and Implicit Task Design
—This paper presents a 2D flow visualization user study that we conducted using new methodologies to increase the objectiveness. We evaluated grid-based variable-size arrows, eve...
Zhanping Liu, Shangshu Cai, J. Edward Swan II, Rob...
SIGMETRICS
2012
ACM
283views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Renewable and cooling aware workload management for sustainable data centers
The demand for data center computing increased significantly in recent years resulting in huge energy consumption. Data centers typically comprise three main subsystems: IT equip...
Zhenhua Liu, Yuan Chen, Cullen Bash, Adam Wierman,...
« Prev « First page 1574 / 1578 Last » Next »