Sciweavers

1712 search results - page 258 / 343
» Discovering user profiles
Sort
View
WISE
2002
Springer
15 years 9 months ago
Log Mining to Improve the Performance of Site Search
Despite of the popularity of global search engines, people still suffer from low accuracy of site search. The primary reason lies in the difference of link structures and data sca...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
HRI
2010
ACM
15 years 9 months ago
From manipulation to communicative gesture
— Assisting humans in their daily lives requires robots to be proficient in manual tasks and effective in communicating states/intentions with human users. This paper advocates ...
Shichao Ou, Roderic A. Grupen
INFOVIS
1999
IEEE
15 years 9 months ago
Visualizing Application Behavior on Superscalar Processors
The advent of superscalar processors with out-of-order execution makes it increasingly difficult to determine how well an application is utilizing the processor and how to adapt t...
Chris Stolte, Robert Bosch, Pat Hanrahan, Mendel R...
ER
2006
Springer
96views Database» more  ER 2006»
15 years 8 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
NSDI
2008
15 years 7 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen