Sciweavers

1545 search results - page 236 / 309
» Information Systems Success Revisited
Sort
View
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 13 days ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng
CHI
2006
ACM
16 years 9 days ago
A continuous and objective evaluation of emotional experience with interactive play environments
Researchers are using emerging technologies to develop novel play environments, while established computer and console game markets continue to grow rapidly. Even so, evaluating t...
Regan L. Mandryk, M. Stella Atkins, Kori M. Inkpen
98
Voted
CHI
2005
ACM
16 years 9 days ago
A logic block enabling logic configuration by non-experts in sensor networks
Recent years have seen the evolution of networks of tiny low power computing blocks, known as sensor networks. In one class of sensor networks, a non-expert user, who has little o...
Susan Cotterell, Frank Vahid
CADE
2003
Springer
16 years 6 days ago
Source-Tracking Unification
We propose a practical path-based framework for deriving and simplifying source-tracking information for term unification in the empty theory. Such a framework is useful for debugg...
Venkatesh Choppella, Christopher T. Haynes
EDBT
2008
ACM
146views Database» more  EDBT 2008»
16 years 23 hour ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra