Sciweavers

8468 search results - page 1313 / 1694
» The Technology of Data Stashing
Sort
View
CHIMIT
2009
ACM
15 years 6 months ago
Network stack diagnosis and visualization tool
End users are often frustrated by unexpected problems while using networked software, leading to frustrated calls to the help desk seeking solutions. However, trying to locate the...
Krist Wongsuphasawat, Pornpat Artornsombudh, Bao N...
KCAP
2009
ACM
15 years 6 months ago
Biomedical knowledge engineering tools based on experimental design: a case study based on neuroanatomical tract-tracing experim
Curating information from the literature for storage in databases is a crucial task in biological research, and many groups assign a particular person or team to that process. We ...
Gully A. P. C. Burns, Thomas A. Russ
SIGIR
2009
ACM
15 years 6 months ago
Fast nonparametric matrix factorization for large-scale collaborative filtering
With the sheer growth of online user data, it becomes challenging to develop preference learning algorithms that are sufficiently flexible in modeling but also affordable in com...
Kai Yu, Shenghuo Zhu, John D. Lafferty, Yihong Gon...
SIGIR
2009
ACM
15 years 6 months ago
Extracting structured information from user queries with semi-supervised conditional random fields
When search is against structured documents, it is beneficial to extract information from user queries in a format that is consistent with the backend data structure. As one step...
Xiao Li, Ye-Yi Wang, Alex Acero
SOUPS
2009
ACM
15 years 6 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
« Prev « First page 1313 / 1694 Last » Next »