Sciweavers

389 search results - page 72 / 78
» Classifications of bifix codes
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 7 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
CHI
2007
ACM
14 years 7 months ago
Effects of audio and visual surrogates for making sense of digital video
Video surrogates are meant to help people quickly make sense of the content of a video before downloading or seeking more detailed information. In this paper we present the result...
Yaxiao Song, Gary Marchionini
CHI
2007
ACM
14 years 7 months ago
FASTDash: a visual dashboard for fostering awareness in software teams
Software developers spend significant time gaining and maintaining awareness of fellow developers' activities. FASTDash is a new interactive visualization that seeks to impro...
Jacob T. Biehl, Mary Czerwinski, Greg Smith, Georg...
ICFP
2008
ACM
14 years 7 months ago
Space profiling for parallel functional programs
This paper presents a semantic space profiler for parallel functional programs. Building on previous work in sequential profiling, our tools help programmers to relate runtime res...
Daniel Spoonhower, Guy E. Blelloch, Robert Harper,...
ICFP
2007
ACM
14 years 7 months ago
User-friendly functional programming for web mashups
MashMaker is a web-based tool that makes it easy for a normal user to create web mashups by browsing around, without needing to type, or plan in advance what they want to do. Like...
Robert Ennals, David Gay