Sciweavers

18016 search results - page 3506 / 3604
» Data Mining - Concepts and Techniques
Sort
View
IUI
2006
ACM
14 years 2 months ago
Who's asking for help?: a Bayesian approach to intelligent assistance
Automated software customization is drawing increasing attention as a means to help users deal with the scope, complexity, potential intrusiveness, and ever-changing nature of mod...
Bowen Hui, Craig Boutilier
IUI
2006
ACM
14 years 2 months ago
A hybrid learning system for recognizing user tasks from desktop activities and email messages
The TaskTracer system seeks to help multi-tasking users manage the resources that they create and access while carrying out their work activities. It does this by associating with...
Jianqiang Shen, Lida Li, Thomas G. Dietterich, Jon...
MM
2006
ACM
79views Multimedia» more  MM 2006»
14 years 2 months ago
ViCo: an adaptive distributed video correlation system
Many emerging applications such as video sensor monitoring can benefit from an on-line video correlation system, which can be used to discover linkages between different video s...
Xiaohui Gu, Zhen Wen, Ching-Yung Lin, Philip S. Yu
PLDI
2006
ACM
14 years 2 months ago
Optimizing memory transactions
Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement...
Timothy L. Harris, Mark Plesko, Avraham Shinnar, D...
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
« Prev « First page 3506 / 3604 Last » Next »