Sciweavers

2699 search results - page 454 / 540
» Planning to Gather Information
Sort
View
IMC
2006
ACM
15 years 5 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
GIS
2009
ACM
16 years 3 days ago
Augmenting Cartographic Resources for Autonomous Driving
In this paper we present algorithms for automatically generating a road network description from aerial imagery. The road network inforamtion (RNI) produced by our algorithm inclu...
Young-Woo Seo, Chris Urmson, David Wettergreen Ji...
WWW
2001
ACM
15 years 11 months ago
On representation of a highlight on the Web: the amber room as a cultural phenomenon in progress
"The Amber Room on the Web" project provides wide public access to information about the process of reconstruction of the Amber Room of the Catherine Palace outside of S...
Tatyana G. Bogomazova, Cyrill A. Malevanov
NORDICHI
2004
ACM
15 years 4 months ago
Procuring a usable system using unemployed personas
This case study examines a procurement project where the Swedish National Labor Market Administration (AMV) hired usability consultants in order to redesign their website for empl...
Erik Markensten, Henrik Artman
SIGMOD
2010
ACM
189views Database» more  SIGMOD 2010»
15 years 3 months ago
Recsplorer: recommendation algorithms based on precedence mining
We study recommendations in applications where there are temporal patterns in the way items are consumed or watched. For example, a student who has taken the Advanced Algorithms c...
Aditya G. Parameswaran, Georgia Koutrika, Benjamin...