Sciweavers

463 search results - page 65 / 93
» The importance of a comprehensive and integrative view of mo...
Sort
View
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 11 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
PLDI
2003
ACM
14 years 1 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
MOBIHOC
2006
ACM
14 years 8 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
CIKM
2009
Springer
14 years 3 months ago
Interactive, topic-based visual text summarization and analysis
We are building an interactive, visual text analysis tool that aids users in analyzing a large collection of text. Unlike existing work in text analysis, which focuses either on d...
Shixia Liu, Michelle X. Zhou, Shimei Pan, Weihong ...
AVI
2010
13 years 6 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza