Sciweavers

2797 search results - page 415 / 560
» Code query by example
Sort
View
141
Voted
CCR
2010
131views more  CCR 2010»
15 years 3 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
CGF
2008
165views more  CGF 2008»
15 years 3 months ago
Visual Inspection of Multivariate Graphs
Most graph visualization techniques focus on the structure of graphs and do not offer support for dealing with node attributes and edge labels. To enable users to detect relations...
A. Johannes Pretorius, Jarke J. van Wijk
IDA
2006
Springer
15 years 3 months ago
Supporting bi-cluster interpretation in 0/1 data by means of local patterns
Clustering or co-clustering techniques have been proved useful in many application domains. A weakness of these techniques remains the poor support for grouping characterization. ...
Ruggero G. Pensa, Céline Robardet, Jean-Fra...
112
Voted
JMM2
2008
107views more  JMM2 2008»
15 years 3 months ago
Finding Interesting Images in Albums using Attention
Commercial systems such as Flickr display interesting photos from their collection as an interaction mechanism for sampling the collection. It purely relies on social activity anal...
Karthikeyan Vaiapury, Mohan S. Kankanhalli
JTAER
2008
103views more  JTAER 2008»
15 years 3 months ago
Reducing False Reads in RFID-Embedded Supply Chains
RFID tags are increasingly being used in supply chain applications due to their potential in engendering supply chain visibility and reducing tracking errors through instantaneous...
Yu-Ju Tu, Selwyn Piramuthu