Sciweavers

7080 search results - page 1411 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
114
Voted
WWW
2006
ACM
16 years 1 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
95
Voted
KDD
2009
ACM
152views Data Mining» more  KDD 2009»
16 years 29 days ago
TANGENT: a novel, 'Surprise me', recommendation algorithm
Most of recommender systems try to find items that are most relevant to the older choices of a given user. Here we focus on the "surprise me" query: A user may be bored ...
Kensuke Onuma, Hanghang Tong, Christos Faloutsos
94
Voted
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
16 years 25 days ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
102
Voted
WWW
2010
ACM
15 years 7 months ago
Live web search experiments for the rest of us
There are significant barriers to academic research into user Web search preferences. Academic researchers are unable to manipulate the results shown by a major search engine to ...
Timothy Jones, David Hawking, Ramesh S. Sankaranar...
94
Voted
SIGMETRICS
2009
ACM
157views Hardware» more  SIGMETRICS 2009»
15 years 7 months ago
Delay tolerant bulk data transfers on the internet
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...
« Prev « First page 1411 / 1416 Last » Next »