Sciweavers

3149 search results - page 596 / 630
» Users in Context
Sort
View
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
14 years 8 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
CHI
2008
ACM
14 years 8 months ago
Understanding and characterizing insights: how do people gain insights using information visualization?
Even though "providing insight" has been considered one of the main purposes of information visualization (InfoVis), we feel that insight is still a not-well-understood ...
Ji Soo Yi, Youn ah Kang, John T. Stasko, Julie A. ...
CHI
2008
ACM
14 years 8 months ago
Investigating statistical machine learning as a tool for software development
As statistical machine learning algorithms and techniques continue to mature, many researchers and developers see statistical machine learning not only as a topic of expert study,...
Kayur Patel, James Fogarty, James A. Landay, Bever...
CHI
2006
ACM
14 years 8 months ago
Talk to me: foundations for successful individual-group interactions in online communities
People come to online communities seeking information, encouragement, and conversation. When a community responds, participants benefit and become more committed. Yet interactions...
Jaime Arguello, Brian S. Butler, Elisabeth Joyce, ...
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 7 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li