Sciweavers

7315 search results - page 1280 / 1463
» Peer-to-Peer Information Search
Sort
View
NORDICHI
2004
ACM
14 years 1 months ago
Two psychology-based usability inspection techniques studied in a diary experiment
Inspection techniques are widely used during systems design as a supplement to empirical evaluations of usability. Psychology-based inspection techniques could give important insi...
Kasper Hornbæk, Erik Frøkjær
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SIGMOD
2004
ACM
153views Database» more  SIGMOD 2004»
14 years 1 months ago
Spatially-decaying aggregation over a network: model and algorithms
Data items are often associated with a location in which they are present or collected, and their relevance or in uence decays with their distance. Aggregate values over such data...
Edith Cohen, Haim Kaplan
CIKM
2004
Springer
14 years 1 months ago
Using a compact tree to index and query XML data
Indexing XML is crucial for efficient XML query processing. We propose a compact tree (Ctree) for XML indexing, which provides not only concise path summaries at group level but a...
Qinghua Zou, Shaorong Liu, Wesley W. Chu
CP
2004
Springer
14 years 1 months ago
Leveraging the Learning Power of Examples in Automated Constraint Acquisition
Constraint programming is rapidly becoming the technology of choice for modeling and solving complex combinatorial problems. However, users of constraint programming technology nee...
Christian Bessière, Remi Coletta, Eugene C....
« Prev « First page 1280 / 1463 Last » Next »