Sciweavers

1568 search results - page 268 / 314
» The problem of examination questions in algorithmics
Sort
View
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
16 years 4 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
IPPS
2008
IEEE
15 years 10 months ago
Programmability of the HPCS Languages: A case study with a quantum chemistry kernel
As high-end computer systems present users with rapidly increasing numbers of processors, possibly also incorporating attached co-processors, programmers are increasingly challeng...
Aniruddha G. Shet, Wael R. Elwasif, Robert J. Harr...
115
Voted
ICDCS
2007
IEEE
15 years 10 months ago
Temporal Privacy in Wireless Sensor Networks
Although the content of sensor messages describing “events of interest” may be encrypted to provide confidentiality, the context surrounding these events may also be sensitiv...
Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong ...
ICDM
2007
IEEE
186views Data Mining» more  ICDM 2007»
15 years 10 months ago
Mining Interpretable Human Strategies: A Case Study
This paper focuses on mining human strategies by observing their actions. Our application domain is an HCI study aimed at discovering general strategies used by software users and...
Xiaoli Z. Fern, Chaitanya Komireddy, Margaret M. B...
HPDC
2005
IEEE
15 years 9 months ago
Dynamic load balancing for distributed search
This paper examines how computation can be mapped across the nodes of a distributed search system to effectively utilize available resources. We specifically address computationa...
Larry Huston, Alex Nizhner, Padmanabhan Pillai, Ra...