Sciweavers

917 search results - page 87 / 184
» What Context Matters
Sort
View
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 10 months ago
Querying and Managing Provenance through User Views in Scientific Workflows
Abstract-- Workflow systems have become increasingly popular for managing experiments where many bioinformatics tasks are chained together. Due to the large amount of data generate...
Olivier Biton, Sarah Cohen Boulakia, Susan B. Davi...
CHI
2008
ACM
14 years 9 months ago
Designs on dignity: perceptions of technology among the homeless
Technology, it is argued, has the potential to improve everyone's life: from the workplace, to entertainment, to easing chores around the home. But what of people who have ne...
Christopher A. Le Dantec, W. Keith Edwards
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
14 years 3 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
JCDL
2009
ACM
128views Education» more  JCDL 2009»
14 years 3 months ago
Mobility, digital libraries and a rural indian village
Millions of people in developed countries routinely create and share digital content; but what about the billions of others in on the wrong side of what has been called the ‘glo...
Matt Jones, Emma Thom, David Bainbridge, David Fro...
ICDCSW
2005
IEEE
14 years 2 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani