Sciweavers

2376 search results - page 328 / 476
» CM - Configuration Change Management
Sort
View
KDD
2004
ACM
195views Data Mining» more  KDD 2004»
14 years 9 months ago
Improved robustness of signature-based near-replica detection via lexicon randomization
Detection of near duplicate documents is an important problem in many data mining and information filtering applications. When faced with massive quantities of data, traditional d...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
KDD
2001
ACM
216views Data Mining» more  KDD 2001»
14 years 9 months ago
Real world performance of association rule algorithms
This study compares five well-known association rule algorithms using three real-world datasets and an artificial dataset. The experimental results confirm the performance improve...
Zijian Zheng, Ron Kohavi, Llew Mason
CHI
2004
ACM
14 years 9 months ago
Context-sensitive design and human-centered interactive systems
Context is a critical element in forming the performance of interactive systems. As the functional diversity and range of use context of the system increase, context sensitivity b...
Keiichi Sato, Ken Douros
CHI
2003
ACM
14 years 9 months ago
The mad hatter's cocktail party: a social mobile audio space supporting multiple simultaneous conversations
This paper presents a mobile audio space intended for use by gelled social groups. In face-to-face interactions in such social groups, conversational floors change frequently, e.g...
Paul M. Aoki, Matthew Romaine, Margaret H. Szymans...
OSDI
2008
ACM
14 years 9 months ago
Avoiding File System Micromanagement with Range Writes
We introduce range writes, a simple but powerful change to the disk interface that removes the need for file system micromanagement of block placement. By allowing a file system t...
Ashok Anand, Sayandeep Sen, Andrew Krioukov, Flore...