Sciweavers

1092 search results - page 181 / 219
» Do summaries help
Sort
View
177
Voted
SIGMOD
2009
ACM
476views Database» more  SIGMOD 2009»
15 years 10 months ago
MobileMiner: a real world case study of data mining in mobile communication
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
Tengjiao Wang, Bishan Yang, Jun Gao, Dongqing Yang...
EDBT
2009
ACM
222views Database» more  EDBT 2009»
15 years 10 months ago
Data clouds: summarizing keyword search results over structured data
Keyword searches are attractive because they facilitate users searching structured databases. On the other hand, tag clouds are popular for navigation and visualization purposes o...
Georgia Koutrika, Zahra Mohammadi Zadeh, Hector Ga...
160
Voted
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 10 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
VR
2009
IEEE
172views Virtual Reality» more  VR 2009»
15 years 10 months ago
Measurement Protocols for Medium-Field Distance Perception in Large-Screen Immersive Displays
How do users of virtual environments perceive virtual space? Many experiments have explored this question, but most of these have used head-mounted immersive displays. This paper ...
Eric Klein, J. Edward Swan II, Gregory S. Schmidt,...
136
Voted
KBSE
2009
IEEE
15 years 10 months ago
Evaluating the Accuracy of Fault Localization Techniques
—We investigate claims and assumptions made in several recent papers about fault localization (FL) techniques. Most of these claims have to do with evaluating FL accuracy. Our in...
Shaimaa Ali, James H. Andrews, Tamilselvi Dhandapa...