Sciweavers

16160 search results - page 3197 / 3232
» How to approach humans
Sort
View
SIGIR
2008
ACM
13 years 7 months ago
A few examples go a long way: constructing query models from elaborate query formulations
We address a specific enterprise document search scenario, where the information need is expressed in an elaborate manner. In our scenario, information needs are expressed using a...
Krisztian Balog, Wouter Weerkamp, Maarten de Rijke
SIGIR
2008
ACM
13 years 7 months ago
Knowledge transformation from word space to document space
In most IR clustering problems, we directly cluster the documents, working in the document space, using cosine similarity between documents as the similarity measure. In many real...
Tao Li, Chris H. Q. Ding, Yi Zhang 0005, Bo Shao
SIGOPS
2008
146views more  SIGOPS 2008»
13 years 7 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
IJHPCA
2007
118views more  IJHPCA 2007»
13 years 7 months ago
Implementing MPI-IO Atomic Mode and Shared File Pointers Using MPI One-Sided Communication
The ROMIO implementation of the MPI-IO standard provides a portable infrastructure for use on top of a variety of underlying storage targets. These targets vary widely in their ca...
Robert Latham, Robert B. Ross, Rajeev Thakur
IJMMS
2007
83views more  IJMMS 2007»
13 years 7 months ago
Making adaptive cruise control (ACC) limits visible
Previous studies have shown adaptive cruise control (ACC) can compromise driving safety when drivers do not understand how the ACC functions, suggesting that drivers need to be in...
Bobbie D. Seppelt, John D. Lee
« Prev « First page 3197 / 3232 Last » Next »