Sciweavers

7984 search results - page 1363 / 1597
» Exploring personal information
Sort
View
APVIS
2009
15 years 5 months ago
TugGraph: Path-preserving hierarchies for browsing proximity and paths in graphs
Many graph visualization systems use graph hierarchies to organize a large input graph into logical components. These approaches detect features globally in the data and place the...
Daniel Archambault, Tamara Munzner, David Auber
ATAL
2010
Springer
15 years 5 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
CHI
2010
ACM
15 years 5 months ago
Designing a CD augmentation for mobile phones
Interacting with physical CDs can be a very tangible and explorative experience. However, physical objects can't provide access to the digital services we are used to when us...
Niels Henze, Susanne Boll
CONEXT
2009
ACM
15 years 4 months ago
Macroscope: end-point approach to networked application dependency discovery
Enterprise and data center networks consist of a large number of complex networked applications and services that depend upon each other. For this reason, they are difficult to ma...
Lucian Popa 0002, Byung-Gon Chun, Ion Stoica, Jaid...
GECCO
2008
Springer
117views Optimization» more  GECCO 2008»
15 years 4 months ago
Non-monotone differential evolution
The Differential Evolution algorithm uses an elitist selection, constantly pushing the population in a strict downhill search, in an attempt to guarantee the conservation of the ...
Michael G. Epitropakis, Vassilis P. Plagianakos, M...
« Prev « First page 1363 / 1597 Last » Next »