Sciweavers

35419 search results - page 196 / 7084
» How are we doing
Sort
View
CORR
2011
Springer
135views Education» more  CORR 2011»
14 years 11 months ago
How to make the most of a shared meal: plan the last bite first
If you are sharing a meal with a companion, how best to make sure you get your favourite fork-fulls? Ethiopian Dinner is a game in which two players take turns eating morsels from ...
Lionel Levine, Katherine E. Stange
CHI
2011
ACM
14 years 8 months ago
Determining relevancy: how software developers determine relevant information in feeds
Finding relevant information within the vast amount of information exchanged via feeds is difficult. Previous research into this problem has largely focused on recommending relev...
Thomas Fritz, Gail C. Murphy
SIGSOFT
2006
ACM
16 years 5 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken
KDD
2006
ACM
185views Data Mining» more  KDD 2006»
16 years 4 months ago
How to Define Searching Sessions on Web Search Engines
We investigate three methods for defining a session on Web search engines. We examine 2,465,145 interactions from 534,507 Web searchers. We compare defining sessions using: 1) Int...
Bernard J. Jansen, Amanda Spink, Vinish Kathuria
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 4 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...