Sciweavers

1421 search results - page 123 / 285
» The First and Second Max-SAT Evaluations
Sort
View
POPL
2009
ACM
14 years 10 months ago
Wild control operators
Linguists seek to understand the semantics of expressions in human languages. Taking a computational point of view, there are many natural language expressions--operators in the w...
Chris Barker
ESORICS
2009
Springer
14 years 10 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...
CHI
2009
ACM
14 years 10 months ago
Extraordinary computing: religion as a lens for reconsidering the home
We present results from a study examining how American Protestant Christians' faith affects their domestic life. There are two contributions of this work for the HCI communit...
Susan Wyche, Rebecca E. Grinter
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
14 years 10 months ago
Time series shapelets: a new primitive for data mining
Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm ...
Lexiang Ye, Eamonn J. Keogh
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
14 years 10 months ago
Mining unexpected rules by pushing user dynamics
Unexpected rules are interesting because they are either previously unknown or deviate from what prior user knowledge would suggest. In this paper, we study three important issues...
Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan