Sciweavers

2907 search results - page 534 / 582
» Trust analysis with clustering
Sort
View
INFOCOM
2012
IEEE
12 years 18 days ago
Characterizing geospatial dynamics of application usage in a 3G cellular data network
—Recent studies on cellular network measurement have provided the evidence that significant geospatial correlations, in terms of traffic volume and application access, exist in...
Muhammad Zubair Shafiq, Lusheng Ji, Alex X. Liu, J...
TVCG
2012
185views Hardware» more  TVCG 2012»
12 years 17 days ago
Interest Driven Navigation in Visualization
—This paper describes a new method to explore and discover within a large data set. We apply techniques from preference elicitation to automatically identify data elements that a...
Christopher G. Healey, Brent M. Dennis
ICSE
2012
IEEE-ACM
12 years 16 days ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
CVPR
2007
IEEE
15 years 5 days ago
Learning a Spatially Smooth Subspace for Face Recognition
Subspace learning based face recognition methods have attracted considerable interests in recently years, including Principal Component Analysis (PCA), Linear Discriminant Analysi...
Deng Cai, Xiaofei He, Yuxiao Hu, Jiawei Han, Thoma...
WWW
2009
ACM
14 years 10 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...