Sciweavers

3013 search results - page 456 / 603
» Context-Oriented Domain Analysis
Sort
View
85
Voted
CHI
2009
ACM
16 years 1 months ago
Towards systematic usability verification
Although usability is the core aspect of the whole HCI research field, it still waits for its economic breakthrough. There are some corporations that are famous for their usable p...
Jan Borchers, Jonathan Diehl, Markus Jordans, Max ...
96
Voted
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
16 years 1 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
205
Voted
SIGMOD
2008
ACM
167views Database» more  SIGMOD 2008»
16 years 1 months ago
DiMaC: a system for cleaning disguised missing data
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
188
Voted
SIGMOD
2007
ACM
195views Database» more  SIGMOD 2007»
16 years 1 months ago
Effective variation management for pseudo periodical streams
Many database applications require the analysis and processing of data streams. In such systems, huge amounts of data arrive rapidly and their values change over time. The variati...
Lv-an Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Don...
129
Voted
ATAL
2009
Springer
15 years 7 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...