Sciweavers

1207 search results - page 227 / 242
» Towards optimal k-anonymization
Sort
View
JCDL
2009
ACM
139views Education» more  JCDL 2009»
14 years 3 months ago
Topic model methods for automatically identifying out-of-scope resources
Recent years have seen the rise of subject-themed digital libraries, such as the NSDL pathways and the Digital Library for Earth System Education (DLESE). These libraries often ne...
Steven Bethard, Soumya Ghosh, James H. Martin, Tam...
WWW
2010
ACM
14 years 3 months ago
Beyond position bias: examining result attractiveness as a source of presentation bias in clickthrough data
Leveraging clickthrough data has become a popular approach for evaluating and optimizing information retrieval systems. Although data is plentiful, one must take care when interpr...
Yisong Yue, Rajan Patel, Hein Roehrig
IPPS
2008
IEEE
14 years 3 months ago
Massively parallel cosmological simulations with ChaNGa
Cosmological simulators are an important component in the study of the formation of galaxies and large scale structures, and can help answer many important questions about the uni...
Pritish Jetley, Filippo Gioachin, Celso L. Mendes,...
ISPASS
2008
IEEE
14 years 3 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg
CEC
2007
IEEE
14 years 2 months ago
Computational chemotaxis in ants and bacteria over dynamic environments
— Chemotaxis can be defined as an innate behavioural response by an organism to a directional stimulus, in which bacteria, and other single-cell or multicellular organisms direct...
Vitorino Ramos, Carlos Fernandes, Agostinho C. Ros...