Sciweavers

904 search results - page 161 / 181
» Towards practical meta-querying
Sort
View
KDD
2008
ACM
161views Data Mining» more  KDD 2008»
14 years 7 months ago
Locality sensitive hash functions based on concomitant rank order statistics
: Locality Sensitive Hash functions are invaluable tools for approximate near neighbor problems in high dimensional spaces. In this work, we are focused on LSH schemes where the si...
Kave Eshghi, Shyamsundar Rajaram
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
14 years 7 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
CHI
2007
ACM
14 years 7 months ago
Studying activity patterns in CSCW
We study small distributed work groups capturing, managing, and reusing knowledge in a collaborative activity. We conceive this process as adaptation of a group to an activity and...
Gregorio Convertino, Thomas P. Moran, Barton A. Sm...
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
14 years 7 months ago
Model Based Test Generation for Microprocessor Architecture Validation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. Traditionally, the different components (or validation collaterals) used i...
Sreekumar V. Kodakara, Deepak Mathaikutty, Ajit Di...
CHI
2002
ACM
14 years 7 months ago
Direct manipulation interface for architectural design tools
The early architectural design stage is a typical example where traditional design tools such as sketching on paper still dominate over computer-assisted tools. Augmented reality ...
Dzmitry Aliakseyeu