Sciweavers

2061 search results - page 343 / 413
» Authorization for Metacomputing Applications
Sort
View
KDD
2007
ACM
276views Data Mining» more  KDD 2007»
16 years 4 months ago
Nonlinear adaptive distance metric learning for clustering
A good distance metric is crucial for many data mining tasks. To learn a metric in the unsupervised setting, most metric learning algorithms project observed data to a lowdimensio...
Jianhui Chen, Zheng Zhao, Jieping Ye, Huan Liu
157
Voted
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
16 years 4 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 4 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
CHI
2008
ACM
16 years 4 months ago
Evaluating tactile feedback and direct vs. indirect stylus input in pointing and crossing selection tasks
We present a pair of experiments that explore the effects of tactile-feedback and direct vs. indirect pen input on pointing and crossing selection tasks. While previous work has d...
Clifton Forlines, Ravin Balakrishnan
CHI
2008
ACM
16 years 4 months ago
On the benefits of confidence visualization in speech recognition
In a typical speech dictation interface, the recognizer's bestguess is displayed as normal, unannotated text. This ignores potentially useful information about the recognizer...
Keith Vertanen, Per Ola Kristensson