Sciweavers

2250 search results - page 101 / 450
» Authorizing applications in singularity
Sort
View
SOCIALCOM
2010
14 years 7 months ago
A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion
Text data pertaining to socio-technical networks often are analyzed separately from relational data, or are reduced to the fact and strength of the flow of information between node...
Jana Diesner, Kathleen M. Carley
CHI
2011
ACM
14 years 1 months ago
Characterizing the usability of interactive applications through query log analysis
People routinely rely on Internet search engines to support their use of interactive systems: they issue queries to learn how to accomplish tasks, troubleshoot problems, and other...
Adam Fourney, Richard Mann, Michael Terry
CSCW
2012
ACM
13 years 5 months ago
Setting the stage for interaction: a tablet application to augment group discussion in a seminar class
We present a tablet-based system to collaboratively track discussion topics and ideas in a seminar-style discussion classroom. Each student uses his or her own tablet to share tex...
Drew Harry, Eric Gordon, Chris Schmandt
CVPR
2008
IEEE
15 years 12 months ago
A unified framework for generalized Linear Discriminant Analysis
Linear Discriminant Analysis (LDA) is one of the wellknown methods for supervised dimensionality reduction. Over the years, many LDA-based algorithms have been developed to cope w...
Shuiwang Ji, Jieping Ye
CVPR
2008
IEEE
15 years 12 months ago
Robust tensor factorization using R1 norm
Over the years, many tensor based algorithms, e.g. two dimensional principle component analysis (2DPCA), two dimensional singular value decomposition (2DSVD), high order SVD, have...
Heng Huang, Chris H. Q. Ding