Sciweavers

2097 search results - page 327 / 420
» Distributed user modelling for universal information access
Sort
View
SSDBM
2003
IEEE
118views Database» more  SSDBM 2003»
15 years 9 months ago
A Practical Approach for Microscopy Imaging Data Management (MIDM) in Neuroscience
Current data management approaches can easily handle the relatively simple requirements for molecular biology research but not the more varied and sophisticated microscopy imaging...
Shenglan Zhang, Xufei Qian, Amarnath Gupta, Maryan...
HT
1999
ACM
15 years 8 months ago
Trailblazing the Literature of Hypertext: Author Co-Citation Analysis (1989-1998)
This paper presents the analysis and modelling of the literature of hypertext based on the ACM Hypertext conference series. This work explores a new paradigm of organising and acc...
Chaomei Chen, Les Carr
AAAI
2007
15 years 6 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
ASPLOS
2010
ACM
15 years 11 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
16 years 4 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada