Sciweavers

917 search results - page 87 / 184
» What Context Matters
Sort
View
262
Voted
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
16 years 5 months ago
Querying and Managing Provenance through User Views in Scientific Workflows
Abstract-- Workflow systems have become increasingly popular for managing experiments where many bioinformatics tasks are chained together. Due to the large amount of data generate...
Olivier Biton, Sarah Cohen Boulakia, Susan B. Davi...
114
Voted
CHI
2008
ACM
16 years 4 months ago
Designs on dignity: perceptions of technology among the homeless
Technology, it is argued, has the potential to improve everyone's life: from the workplace, to entertainment, to easing chores around the home. But what of people who have ne...
Christopher A. Le Dantec, W. Keith Edwards
SSDBM
2009
IEEE
116views Database» more  SSDBM 2009»
15 years 10 months ago
Constraint-Based Learning of Distance Functions for Object Trajectories
Abstract. With the drastic increase of object trajectory data, the analysis and exploration of trajectories has become a major research focus with many applications. In particular,...
Wei Yu, Michael Gertz
139
Voted
JCDL
2009
ACM
128views Education» more  JCDL 2009»
15 years 10 months ago
Mobility, digital libraries and a rural indian village
Millions of people in developed countries routinely create and share digital content; but what about the billions of others in on the wrong side of what has been called the ‘glo...
Matt Jones, Emma Thom, David Bainbridge, David Fro...
134
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani