Sciweavers

448 search results - page 79 / 90
» Pipelining Argumentation Technologies
Sort
View
HICSS
1994
IEEE
141views Biometrics» more  HICSS 1994»
15 years 3 months ago
Empirical CATeam Research in Meetings
Meeting research and especially research on Computer Supported Meetings of natural teams is not available in abundance. What is reported of meetings often uses a rather limited th...
Helmut Krcmar, Henrik Lewe, Gerhard Schwabe
JASIS
2008
123views more  JASIS 2008»
14 years 11 months ago
Democratic theory in library information science
: A recent article by Joseph Buschman regrets that democratic theory is an unfinished idea. The argument appears to assume an essential relationship between library information sci...
Michael K. Buckland
ICWSM
2009
14 years 9 months ago
From Generating to Mining: Automatically Scripting Conversations Using Existing Online Sources
Hearing people argue opposing sides of an issue can be a useful way to understand the topic; however, these debates or conversations often don't exist. Unfortunately, generat...
Nathan D. Nichols, Lisa M. Gandy, Kristian J. Hamm...
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
16 years 2 days ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
DSN
2009
IEEE
15 years 6 months ago
Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems
The threat of soft error induced system failure in high performance computing systems has become more prominent, as we adopt ultra-deep submicron process technologies. In this pap...
Naga Durga Prasad Avirneni, Viswanathan Subramania...