Sciweavers

694 search results - page 17 / 139
» Representing and Applying Design Patterns: What Is the Probl...
Sort
View
ICDM
2005
IEEE
157views Data Mining» more  ICDM 2005»
14 years 2 months ago
Blocking Anonymity Threats Raised by Frequent Itemset Mining
In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty o...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
ITS
2010
Springer
178views Multimedia» more  ITS 2010»
14 years 1 months ago
Learning What Works in ITS from Non-traditional Randomized Controlled Trial Data
The traditional, well established approach to finding out what works in education research is to run a randomized controlled trial (RCT) using a standard pretest and posttest desig...
Zachary A. Pardos, Matthew D. Dailey, Neil T. Heff...
HICSS
2005
IEEE
114views Biometrics» more  HICSS 2005»
14 years 2 months ago
Team Pattern Recognition: Sharing Cognitive Chunks Under Time Pressure
This study extends the theory of Recognition Primed Decision-Making by applying it to groups. Furthermore, we explore the application of Template Theory to collaboration. An exper...
Stephen C. Hayne, C. A. P. Smith, Leo R. Vijayasar...
SISAP
2009
IEEE
155views Data Mining» more  SISAP 2009»
14 years 3 months ago
Analyzing Metric Space Indexes: What For?
—It has been a long way since the beginnings of metric space searching, where people coming from algorithmics tried to apply their background to this new paradigm, obtaining vari...
Gonzalo Navarro
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
14 years 9 months ago
A multinomial clustering model for fast simulation of computer architecture designs
Computer architects utilize simulation tools to evaluate the merits of a new design feature. The time needed to adequately evaluate the tradeoffs associated with adding any new fe...
Kaushal Sanghai, Ting Su, Jennifer G. Dy, David R....