Sciweavers

247 search results - page 24 / 50
» Roles Are Really Great!
Sort
View
94
Voted
KDD
2008
ACM
110views Data Mining» more  KDD 2008»
16 years 1 months ago
Mining preferences from superior and inferior examples
Mining user preferences plays a critical role in many important applications such as customer relationship management (CRM), product and service recommendation, and marketing camp...
Bin Jiang, Jian Pei, Xuemin Lin, David W. Cheung, ...
93
Voted
VLSID
2005
IEEE
100views VLSI» more  VLSID 2005»
16 years 1 months ago
A Fast Buffered Routing Tree Construction Algorithm under Accurate Delay Model
Buffer insertion method plays a great role in modern VLSI design. Many buffer insertion algorithms have been proposed in recent years. However, most of them used simplified delay ...
Yibo Wang, Yici Cai, Xianlong Hong
100
Voted
CHI
2004
ACM
16 years 1 months ago
Breaking the book: translating the chemistry lab book into a pervasive computing lab environment
The UK e-Science programme is relying on the evolution of the paper lab book into a pervasive data gathering lab system. To date take up of existing commercial or research lab boo...
Monica M. C. Schraefel, Gareth V. Hughes, Hugo R. ...
159
Voted
SIGMOD
2006
ACM
117views Database» more  SIGMOD 2006»
16 years 27 days ago
Database support for matching: limitations and opportunities
We define a match join of R and S with predicate to be a subset of the -join of R and S such that each tuple of R and S contributes to at most one result tuple. Match joins and t...
Ameet Kini, Srinath Shankar, Jeffrey F. Naughton, ...
73
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
A Logic Distance-Based Method for Deploying Probing Sources in the Topology Discovery
Abstract—Internet topology plays a vital role in studying network’s internal structure and properties. Currently traceroutebased topology discovery is the main approach to map ...
Xin Zou, Zhongliang Qiao, Gang Zhou, Ke Xu