Sciweavers

744 search results - page 135 / 149
» The Traust Authorization Service
Sort
View
87
Voted
CHI
2009
ACM
15 years 10 months ago
Designable visual markers
Visual markers are graphic symbols designed to be easily recognised by machines. They are traditionally used to track goods, but there is increasing interest in their application ...
Enrico Costanza, Jeffrey Huang
KDD
2009
ACM
185views Data Mining» more  KDD 2009»
15 years 10 months ago
Entity discovery and assignment for opinion mining applications
Opinion mining became an important topic of study in recent years due to its wide range of applications. There are also many companies offering opinion mining services. One proble...
Xiaowen Ding, Bing Liu, Lei Zhang
83
Voted
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 10 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...
110
Voted
KDD
2007
ACM
193views Data Mining» more  KDD 2007»
15 years 10 months ago
Joint optimization of wrapper generation and template detection
Many websites have large collections of pages generated dynamically from an underlying structured source like a database. The data of a category are typically encoded into similar...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen, Di Wu
CHI
2006
ACM
15 years 10 months ago
Responsiveness in instant messaging: predictive models supporting inter-personal communication
For the majority of us, inter-personal communication is an essential part of our daily lives. Instant Messaging, or IM, has been growing in popularity for personal and workrelated...
Daniel Avrahami, Scott E. Hudson