Sciweavers

2801 search results - page 522 / 561
» On the Adequateness of the Connection Method
Sort
View
CHI
2004
ACM
15 years 10 months ago
Affective sensors, privacy, and ethical contracts
Sensing affect raises critical privacy concerns, which are examined here using ethical theory, and with a study that illuminates the connection between ethical theory and privacy....
Carson Reynolds, Rosalind W. Picard
STOC
2006
ACM
174views Algorithms» more  STOC 2006»
15 years 10 months ago
Edge-disjoint paths in Planar graphs with constant congestion
We study the maximum edge-disjoint paths problem in undirected planar graphs: given a graph G and node pairs s1t1, s2t2, . . ., sktk, the goal is to maximize the number of pairs t...
Chandra Chekuri, Sanjeev Khanna, F. Bruce Shepherd
STOC
2004
ACM
145views Algorithms» more  STOC 2004»
15 years 10 months ago
Using mixture models for collaborative filtering
A collaborative filtering system at an e-commerce site or similar service uses data about aggregate user behavior to make recommendations tailored to specific user interests. We d...
Jon M. Kleinberg, Mark Sandler
SIGMOD
2009
ACM
198views Database» more  SIGMOD 2009»
15 years 10 months ago
Monitoring path nearest neighbor in road networks
This paper addresses the problem of monitoring the k nearest neighbors to a dynamically changing path in road networks. Given a destination where a user is going to, this new quer...
Zaiben Chen, Heng Tao Shen, Xiaofang Zhou, Jeffrey...
ICSE
2007
IEEE-ACM
15 years 9 months ago
Modeling in Software Engineering
A data model is a plan for building a database and is comparable to an architect's building plans. There are two major methodologies used to create a data model: the EntityRe...
Joanne M. Atlee, Robert B. France, Geri Georg, Ana...