Sciweavers

1679 search results - page 253 / 336
» Evaluation by comparing result sets in context
Sort
View
CHI
2005
ACM
14 years 8 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
WISE
2005
Springer
14 years 1 months ago
Extracting Web Data Using Instance-Based Learning
This paper studies structured data extraction from Web pages, e.g., online product description pages. Existing approaches to data extraction include wrapper induction and automatic...
Yanhong Zhai, Bing Liu
SIGGRAPH
1998
ACM
13 years 12 months ago
Non-distorted Texture Mapping for Sheared Triangulated Meshes
This article introduces new techniques for non-distorted texture mapping on complex triangulated meshes. Texture coordinates are assigned to the vertices of the triangulation by u...
Bruno Lévy, Jean-Laurent Mallet
ICDCS
2012
IEEE
11 years 10 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
ICDE
2009
IEEE
159views Database» more  ICDE 2009»
14 years 9 months ago
Sketch-Based Summarization of Ordered XML Streams
XML streams, such as RSS feeds or complex event streams, are becoming increasingly pervasive as they provide the foundation for a wide range of emerging applications. An important...
Veronica Mayorga, Neoklis Polyzotis