Sciweavers

8468 search results - page 57 / 1694
» The Technology of Data Stashing
Sort
View
WEBI
2010
Springer
14 years 7 months ago
Integrating Provenance Information in Reservoir Engineering
Data management and analysis has become an integral component in the area of reservoir engineering. An important metric that determines the overall effectiveness of data analysis i...
Jing Zhao, Na Chen, Karthik Gomadam, Viktor K. Pra...
SIGKDD
2010
135views more  SIGKDD 2010»
14 years 4 months ago
Novel data stream pattern mining report on the StreamKDD'10 workshop
This report summarizes the First International Workshop on Novel Data Stream Pattern Mining held at the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mi...
Margaret H. Dunham, Michael Hahsler, Myra Spiliopo...
CHI
2003
ACM
15 years 10 months ago
Technology probes: inspiring design for and with families
We describe a new methodology for designing technologies for and with families called technology probes. Technology probes are simple, flexible, adaptable technologies introduced ...
Allison Druin, Benjamin B. Bederson, Björn Ei...
PUC
2010
84views more  PUC 2010»
14 years 8 months ago
Information privacy in institutional and end-user tracking and recording technologies
This paper presents an analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). This work focuses ...
David H. Nguyen, Gillian R. Hayes
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
15 years 4 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin