Sciweavers

261 search results - page 52 / 53
» Eye-tracking analysis of user behavior in WWW search
Sort
View
INFOVIS
2005
IEEE
13 years 11 months ago
Visualization of Graphs with Associated Timeseries Data
The most common approach to support analysis of graphs with associated time series data include: overlay of data on graph vertices for one timepoint at a time by manipulating a vi...
Purvi Saraiya, Peter Lee, Chris North
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 5 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
14 years 5 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo
RECSYS
2009
ACM
13 years 10 months ago
iTag: a personalized blog tagger
We present iTag, a personalized tag recommendation system for blogs. iTag improves on the state-of-the-art in tag recommendation systems in two ways. First, iTag has much higher p...
Michael Hart, Rob Johnson, Amanda Stent
IEEEPACT
2005
IEEE
13 years 11 months ago
HUNTing the Overlap
Hiding communication latency is an important optimization for parallel programs. Programmers or compilers achieve this by using non-blocking communication primitives and overlappi...
Costin Iancu, Parry Husbands, Paul Hargrove