Sciweavers

687 search results - page 55 / 138
» A Framework for Exploring Categorical Data.
Sort
View
CHI
2009
ACM
15 years 10 months ago
Critical methods and user generated content: the iPhone on YouTube
Sites like YouTube offer vast sources of data for studies of Human Computer Interaction (HCI). However, they also present a number of methodological challenges. This paper offers ...
Mark Blythe, Paul A. Cairns
CHI
2009
ACM
15 years 10 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that the...
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc...
GLOBECOM
2007
IEEE
15 years 4 months ago
Virtualization of Local Computer Bus Architectures Over the Internet
We propose a companion solution to iSCSI that is more suited for virtualization of local computer bus architectures, such as PCI/PCI-X and PCI Express. We explore the architecture ...
David A. Daniel, Joseph Y. Hui
PAKDD
2010
ACM
167views Data Mining» more  PAKDD 2010»
15 years 2 months ago
Hierarchical Web-Page Clustering via In-Page and Cross-Page Link Structures
Abstract. Despite of the wide diversity of web-pages, web-pages residing in a particular organization, in most cases, are organized with semantically hierarchic structures. For exa...
Cindy Xide Lin, Yintao Yu, Jiawei Han, Bing Liu
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad