Sciweavers

15351 search results - page 2972 / 3071
» The information bottleneck method
Sort
View
IDEAS
2003
IEEE
131views Database» more  IDEAS 2003»
14 years 3 months ago
Neighborhood Signatures for Searching P2P Networks
Overlay networks have received a lot of attention due to the recent wide-spread use of peer-to-peer (P2P) applications such as SETI, Napster, Gnutella, and Morpheus. Through repli...
Mei Li, Wang-Chien Lee, Anand Sivasubramaniam
INFOVIS
2003
IEEE
14 years 3 months ago
Exploring High-D Spaces with Multiform Matrices and Small Multiples
We introduce an approach to visual analysis of multivariate data that integrates several methods from information visualization, exploratory data analysis (EDA), and geovisualizat...
Alan M. MacEachren, Xiping Dai, Frank Hardisty, Di...
IV
2003
IEEE
201views Visualization» more  IV 2003»
14 years 3 months ago
Layout Metrics for Euler Diagrams
An alternative term for these diagrams is “Euler-Venn diagrams” but they are often inaccurately called “Venn diagrams”. Venn diagrams often look similar, but must contain a...
Jean Flower, Peter Rodgers, Paul Mutton
IV
2003
IEEE
200views Visualization» more  IV 2003»
14 years 3 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
SP
2003
IEEE
116views Security Privacy» more  SP 2003»
14 years 3 months ago
Garbage Collector Memory Accounting in Language-Based Systems
Language run-time systems are often called upon to safely execute mutually distrustful tasks within the same runtime, protecting them from other tasks’ bugs or otherwise hostile...
David W. Price, Algis Rudys, Dan S. Wallach
« Prev « First page 2972 / 3071 Last » Next »