With the growth of the Web as a public information resource, users need workspaces to support the collection, evaluation, organization, and annotation of the materials they retrie...
Frank M. Shipman III, Catherine C. Marshall, Mark ...
Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to obj...
Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czaj...
Discovering sequential patterns is an important problem in data mining with a host of application domains including medicine, telecommunications, and the World Wide Web. Conventio...
Minos N. Garofalakis, Rajeev Rastogi, Kyuseok Shim
In order for multimedia presentations to be stored, accessed and played from a large library they should not be encoded as final form presentations, since these consume storage sp...
Lloyd Rutledge, Jacco van Ossenbruggen, Lynda Hard...
The Bead visualization system employs a fast algorithm for laying out high-dimensional data in a low-dimensional space, and a number of features added to 3D visualizations to impr...
Dominique Brodbeck, Matthew Chalmers, Aran Lunzer,...