Sciweavers

293 search results - page 29 / 59
» Design of Experiments via Information Theory
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
14 years 15 days ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
MM
2005
ACM
209views Multimedia» more  MM 2005»
14 years 2 months ago
Learning an image-word embedding for image auto-annotation on the nonlinear latent space
Latent Semantic Analysis (LSA) has shown encouraging performance for the problem of unsupervised image automatic annotation. LSA conducts annotation by keywords propagation on a l...
Wei Liu, Xiaoou Tang
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
14 years 9 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu
BEHAVIOURIT
2004
171views more  BEHAVIOURIT 2004»
13 years 8 months ago
Long-term working memory and interrupting messages in human - computer interaction
The extent to which memory for information content is reliable, trustworthy, and accurate is crucial in the information age. Being forced to divert attention to interrupting messag...
Antti Oulasvirta, Pertti Saariluoma
CHI
2004
ACM
14 years 8 months ago
Persistence matters: making the most of chat in tightly-coupled work
How much history of the dialogue should a chat client include? Some chat clients have minimized the dialogue history to deploy the space for other purposes. A theory of conversati...
Darren Gergle, David R. Millen, Robert E. Kraut, S...