Sciweavers

15781 search results - page 2947 / 3157
» Evaluating Information Extraction
Sort
View
CHI
2009
ACM
16 years 5 months ago
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but nearly all prior work makes the unrealisti...
Katherine Everitt, Tanya Bragin, James Fogarty, Ta...
CHI
2009
ACM
16 years 5 months ago
Dancing with myself: the interactive visual canon platform
The canon is a composition pattern with a long history and many forms. The concept of the canon has also been applied to experimental film making and on Japanese television. We de...
Christoph Bartneck, Martijn ten Bhömer, Mathi...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 5 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
KDD
2009
ACM
168views Data Mining» more  KDD 2009»
16 years 5 months ago
Sustainable operation and management of data center chillers using temporal data mining
Motivation: Data centers are a critical component of modern IT infrastructure but are also among the worst environmental offenders through their increasing energy usage and the re...
Debprakash Patnaik, Manish Marwah, Ratnesh K. Shar...
KDD
2005
ACM
165views Data Mining» more  KDD 2005»
16 years 4 months ago
Co-clustering by block value decomposition
Dyadic data matrices, such as co-occurrence matrix, rating matrix, and proximity matrix, arise frequently in various important applications. A fundamental problem in dyadic data a...
Bo Long, Zhongfei (Mark) Zhang, Philip S. Yu
« Prev « First page 2947 / 3157 Last » Next »