Sciweavers

5864 search results - page 1156 / 1173
» Can We Work around Numerical Methods
Sort
View
CHI
2004
ACM
14 years 8 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
EDBT
2006
ACM
120views Database» more  EDBT 2006»
14 years 8 months ago
Similarity Search on Time Series Based on Threshold Queries
Similarity search in time series data is required in many application fields. The most prominent work has focused on similarity search considering either complete time series or si...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...
KDD
2009
ACM
266views Data Mining» more  KDD 2009»
14 years 3 months ago
OpinionMiner: a novel machine learning system for web opinion mining and extraction
Merchants selling products on the Web often ask their customers to share their opinions and hands-on experiences on products they have purchased. Unfortunately, reading through al...
Wei Jin, Hung Hay Ho, Rohini K. Srihari
INFOCOM
2009
IEEE
14 years 3 months ago
Identifying High Cardinality Internet Hosts
—The Internet host cardinality, defined as the number of distinct peers that an Internet host communicates with, is an important metric for profiling Internet hosts. Some examp...
Jing Cao, Yu Jin, Aiyou Chen, Tian Bu, Zhi-Li Zhan...
CIKM
2009
Springer
14 years 3 months ago
Semi-supervised learning of semantic classes for query understanding: from the web and for the web
Understanding intents from search queries can improve a user’s search experience and boost a site’s advertising profits. Query tagging via statistical sequential labeling mode...
Ye-Yi Wang, Raphael Hoffmann, Xiao Li, Jakub Szyma...
« Prev « First page 1156 / 1173 Last » Next »