Sciweavers

870 search results - page 157 / 174
» Studying paper use to inform the design of personal and port...
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 7 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
CCS
2011
ACM
12 years 7 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
MSWIM
2005
ACM
14 years 29 days ago
Randomized energy aware routing algorithms in mobile ad hoc networks
We consider the problem of energy aware localized routing in ad hoc networks. In localized routing algorithms, each node forwards a message based on the position information about...
Israat Tanzeena Haque, Chadi Assi, J. William Atwo...
CHI
2008
ACM
14 years 7 months ago
A co-located interface for narration to support reconciliation in a conflict: initial results from Jewish and Palestinian youth
So called intractable conflicts may benefit from more modest and socially oriented approaches than those based on classical conflict resolution techniques. This paper is inspired ...
Oliviero Stock, Massimo Zancanaro, Chaya Koren, Ce...
DIGITALCITIES
2003
Springer
14 years 18 days ago
Visualizing Social Patterns in Virtual Environments on a Local and Global Scale
Today a wide variety of virtual worlds, cities, gaming environments etc. exist and become part of life of their human inhabitants. However, our understanding on how technology infl...
Katy Börner, Shashikant Penumarthy, Bonnie Je...