Sciweavers

334 search results - page 50 / 67
» A first step towards algorithm plagiarism detection
Sort
View
ICML
2008
IEEE
15 years 10 months ago
On the quantitative analysis of deep belief networks
Deep Belief Networks (DBN's) are generative models that contain many layers of hidden variables. Efficient greedy algorithms for learning and approximate inference have allow...
Ruslan Salakhutdinov, Iain Murray
WWW
2002
ACM
15 years 10 months ago
An incremental XSLT transformation processor for XML document manipulation
In this paper, we present an incremental transformation framework called incXSLT. This framework has been experimented for the XSLT language defined at the World Wide Web Consorti...
Lionel Villard, Nabil Layaïda
79
Voted
CHI
2009
ACM
15 years 10 months ago
Attaching UI enhancements to websites with end users
We present reform, a system that envisions roles for both programmers and end users in enhancing existing websites to support new goals. First, programmers author a traditional ma...
Michael Toomim, Steven M. Drucker, Mira Dontcheva,...
MOBISYS
2005
ACM
15 years 9 months ago
An overlay MAC layer for 802.11 networks
The widespread availability of 802.11-based hardware has made it the premier choice of both researchers and practitioners for developing new wireless networks and applications. Ho...
Ananth Rao, Ion Stoica
IUI
2009
ACM
15 years 6 months ago
From geek to sleek: integrating task learning tools to support end users in real-world applications
Numerous techniques exist to help users automate repetitive tasks; however, none of these methods fully support enduser creation, use, and modification of the learned tasks. We pr...
Aaron Spaulding, Jim Blythe, Will Haines, Melinda ...