Sciweavers

7080 search results - page 1411 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
98
Voted
WWW
2006
ACM
15 years 11 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
KDD
2009
ACM
152views Data Mining» more  KDD 2009»
15 years 11 months ago
TANGENT: a novel, 'Surprise me', recommendation algorithm
Most of recommender systems try to find items that are most relevant to the older choices of a given user. Here we focus on the "surprise me" query: A user may be bored ...
Kensuke Onuma, Hanghang Tong, Christos Faloutsos
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
15 years 10 months ago
DiMaC: a disguised missing data cleaning tool
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
86
Voted
WWW
2010
ACM
15 years 5 months ago
Live web search experiments for the rest of us
There are significant barriers to academic research into user Web search preferences. Academic researchers are unable to manipulate the results shown by a major search engine to ...
Timothy Jones, David Hawking, Ramesh S. Sankaranar...
SIGMETRICS
2009
ACM
157views Hardware» more  SIGMETRICS 2009»
15 years 5 months ago
Delay tolerant bulk data transfers on the internet
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...
« Prev « First page 1411 / 1416 Last » Next »