Sciweavers

4445 search results - page 835 / 889
» Reflective Authorization Systems
Sort
View
CHI
2009
ACM
15 years 10 months ago
Comparing the use of tangible and graphical programming languages for informal science education
Much of the work done in the field of tangible interaction has focused on creating tools for learning; however, in many cases, little evidence has been provided that tangible inte...
Michael S. Horn, Erin Treacy Solovey, R. Jordan Cr...
CHI
2009
ACM
15 years 10 months ago
UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits
The greatest contributor of CO2 emissions in the average American household is personal transportation. Because transportation is inherently a mobile activity, mobile devices are ...
Jon Froehlich, Tawanna Dillahunt, Predrag V. Klasn...
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
15 years 10 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
MOBISYS
2009
ACM
15 years 10 months ago
Predictive methods for improved vehicular WiFi access
With the proliferation of WiFi technology, many WiFi networks are accessible from vehicles on the road making vehicular WiFi access realistic. However, several challenges exist: l...
Pralhad Deshpande, Anand Kashyap, Chul Sung, Samir...
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
15 years 10 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu