Sciweavers

2061 search results - page 343 / 413
» Authorization for Metacomputing Applications
Sort
View
KDD
2007
ACM
276views Data Mining» more  KDD 2007»
16 years 1 months ago
Nonlinear adaptive distance metric learning for clustering
A good distance metric is crucial for many data mining tasks. To learn a metric in the unsupervised setting, most metric learning algorithms project observed data to a lowdimensio...
Jianhui Chen, Zheng Zhao, Jieping Ye, Huan Liu
KDD
2007
ACM
154views Data Mining» more  KDD 2007»
16 years 1 months ago
Canonicalization of database records using adaptive similarity measures
It is becoming increasingly common to construct databases from information automatically culled from many heterogeneous sources. For example, a research publication database can b...
Aron Culotta, Michael L. Wick, Robert Hall, Matthe...
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 1 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
CHI
2008
ACM
16 years 29 days ago
Evaluating tactile feedback and direct vs. indirect stylus input in pointing and crossing selection tasks
We present a pair of experiments that explore the effects of tactile-feedback and direct vs. indirect pen input on pointing and crossing selection tasks. While previous work has d...
Clifton Forlines, Ravin Balakrishnan
79
Voted
CHI
2008
ACM
16 years 29 days ago
On the benefits of confidence visualization in speech recognition
In a typical speech dictation interface, the recognizer's bestguess is displayed as normal, unannotated text. This ignores potentially useful information about the recognizer...
Keith Vertanen, Per Ola Kristensson