Sciweavers

1662 search results - page 168 / 333
» Privately Finding Specifications
Sort
View
CHI
2009
ACM
16 years 4 months ago
Tilt techniques: investigating the dexterity of wrist-based input
Most studies on tilt based interaction can be classified as point-designs that demonstrate the utility of wrist-tilt as an input medium; tilt parameters are tailored to suit the s...
Mahfuz Rahman, Sean Gustafson, Pourang Irani, Srir...
CHI
2009
ACM
16 years 4 months ago
Values as lived experience: evolving value sensitive design in support of value discovery
The Value Sensitive Design (VSD) methodology provides a comprehensive framework for advancing a value-centered research and design agenda. Although VSD provides helpful ways of th...
Christopher A. Le Dantec, Erika Shehan Poole, Susa...
140
Voted
KDD
2009
ACM
190views Data Mining» more  KDD 2009»
16 years 4 months ago
Named entity mining from click-through data using weakly supervised latent dirichlet allocation
This paper addresses Named Entity Mining (NEM), in which we mine knowledge about named entities such as movies, games, and books from a huge amount of data. NEM is potentially use...
Gu Xu, Shuang-Hong Yang, Hang Li
132
Voted
KDD
2009
ACM
202views Data Mining» more  KDD 2009»
16 years 4 months ago
Correlated itemset mining in ROC space: a constraint programming approach
Correlated or discriminative pattern mining is concerned with finding the highest scoring patterns w.r.t. a correlation measure (such as information gain). By reinterpreting corre...
Siegfried Nijssen, Tias Guns, Luc De Raedt
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
16 years 3 months ago
Active exploration for learning rankings from clickthrough data
We address the task of learning rankings of documents from search engine logs of user behavior. Previous work on this problem has relied on passively collected clickthrough data. ...
Filip Radlinski, Thorsten Joachims