Sciweavers

11325 search results - page 2153 / 2265
» Active Model Selection
Sort
View
137
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 3 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
135
Voted
CHI
2007
ACM
16 years 3 months ago
Social practices in location-based collecting
The use of location-based technology to augment visitor experiences has received considerable attention over the years. In this paper, we take an alternative perspective on these ...
Kenton O'Hara, Tim Kindberg, Maxine Glancy, Lucian...
123
Voted
HPCA
2008
IEEE
16 years 3 months ago
Automated microprocessor stressmark generation
Estimating the maximum power and thermal characteristics of a processor is essential for designing its power delivery system, packaging, cooling, and power/thermal management sche...
Ajay M. Joshi, Lieven Eeckhout, Lizy Kurian John, ...
116
Voted
CHI
2003
ACM
16 years 3 months ago
Sense and sensibility: evaluation and interactive art
HCI evaluation methods are useful for improving the design of interactive systems, yet they may be rejected by nontraditional technology disciplines such as media art. We have dev...
Gerd Andersson, Kristina Höök, Phoebe Se...
SIGMOD
2006
ACM
238views Database» more  SIGMOD 2006»
16 years 3 months ago
Continuous monitoring of top-k queries over sliding windows
Given a dataset P and a preference function f, a top-k query retrieves the k tuples in P with the highest scores according to f. Even though the problem is well-studied in convent...
Kyriakos Mouratidis, Spiridon Bakiras, Dimitris Pa...
« Prev « First page 2153 / 2265 Last » Next »