Sciweavers

2061 search results - page 321 / 413
» Authorization for Metacomputing Applications
Sort
View
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 4 months ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
133
Voted
CHI
2008
ACM
16 years 4 months ago
Investigating statistical machine learning as a tool for software development
As statistical machine learning algorithms and techniques continue to mature, many researchers and developers see statistical machine learning not only as a topic of expert study,...
Kayur Patel, James Fogarty, James A. Landay, Bever...
142
Voted
CHI
2008
ACM
16 years 4 months ago
CueFlik: interactive concept learning in image search
Web image search is difficult in part because a handful of keywords are generally insufficient for characterizing the visual properties of an image. Popular engines have begun to ...
James Fogarty, Desney S. Tan, Ashish Kapoor, Simon...
CHI
2008
ACM
16 years 4 months ago
The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science educa
The advent of novel materials (such as conductive fibers) combined with accessible embedded computing platforms have made it possible to re-imagine the landscapes of fabric and el...
Leah Buechley, Michael Eisenberg, Jaime Catchen, A...
128
Voted
CHI
2007
ACM
16 years 4 months ago
Recent shortcuts: using recent interactions to support shared activities
We present an empirical study of teams that revealed the amount of extraneous individual work needed to enable collaboration: finding references to other people, finding files to ...
John C. Tang, James Lin, Jeffrey Pierce, Steve Whi...