Sciweavers

2990 search results - page 565 / 598
» Designing personalized web applications
Sort
View
ERCIMDL
2001
Springer
178views Education» more  ERCIMDL 2001»
14 years 2 months ago
Customizable Retrieval Functions Based on User Tasks in the Cultural Heritage Domain
The cultural heritage domain dealing with digital surrogates of rare and fragile historic artifacts is one of the most promising areas for establishing collaboratories, i.e. shared...
Holger Brocks, Ulrich Thiel, Adelheit Stein, Andre...
SIGCSE
2000
ACM
453views Education» more  SIGCSE 2000»
14 years 2 months ago
Aristotle and object-oriented programming: why modern students need traditional logic
Classifying is a central activity in object-oriented programming and distinguishes it from procedural programming. Traditional logic, initiated by Aristotle, assigns classificatio...
Derek Rayside, Gerard T. Campbell
KDD
1999
ACM
220views Data Mining» more  KDD 1999»
14 years 2 months ago
Efficient Mining of Emerging Patterns: Discovering Trends and Differences
We introduce a new kind of patterns, called emerging patterns (EPs), for knowledge discovery from databases. EPs are defined as itemsets whose supports increase significantly from...
Guozhu Dong, Jinyan Li
CHI
2007
ACM
14 years 1 months ago
Capturing, sharing, and using local place information
With new technology, people can share information about everyday places they go; the resulting data helps others find and evaluate places. Recent applications like Dodgeball and S...
Pamela J. Ludford, Reid Priedhorsky, Ken Reily, Lo...
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore