Sciweavers

493 search results - page 79 / 99
» Generating Ambiguity in the Laboratory
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Efficient closed pattern mining in the presence of tough block constraints
In recent years, various constrained frequent pattern mining problem formulations and associated algorithms have been developed that enable the user to specify various itemsetbase...
Krishna Gade, Jianyong Wang, George Karypis
CHI
2005
ACM
15 years 9 months ago
Studying the effectiveness of MOVE: a contextually optimized in-vehicle navigation system
In-vehicle navigation has changed substantially in recent years, due to the advent of computer generated maps and directions. However, these maps are still problematic, due to a m...
Joonhwan Lee, Jodi Forlizzi, Scott E. Hudson
CHI
2002
ACM
15 years 9 months ago
SCANMail: a voicemail interface that makes speech browsable, readable and searchable
Increasing amounts of public, corporate, and private speech data are now available on-line. These are limited in their usefulness, however, by the lack of tools to permit their br...
Steve Whittaker, Julia Hirschberg, Brian Amento, L...
IUI
2009
ACM
15 years 6 months ago
Intelligently creating and recommending reusable reformatting rules
When users combine data from multiple sources into a spreadsheet or dataset, the result is often a mishmash of different formats, since phone numbers, dates, course numbers and ot...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
WISEC
2010
ACM
15 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...