Sciweavers

4327 search results - page 735 / 866
» Web presentation system using RST events
Sort
View
WWW
2009
ACM
16 years 6 months ago
Blog credibility ranking by exploiting verified content
People use weblogs to express thoughts, present ideas and share knowledge. However, weblogs can also be misused to influence and manipulate the readers. Therefore the credibility ...
Andreas Juffinger, Michael Granitzer, Elisabeth Le...
PAKDD
1999
ACM
124views Data Mining» more  PAKDD 1999»
15 years 9 months ago
Discovery of Equations and the Shared Operational Semantics in Distributed Autonomous Databases
Empirical equations are an important class of regularities that can be discovered in databases. In this paper we concentrate on the role of equations as de nitions of attribute val...
Zbigniew W. Ras, Jan M. Zytkow
WOSP
2010
ACM
15 years 10 months ago
Quantifying load imbalance on virtualized enterprise servers
Virtualization has been shown to be an attractive path to increase overall system resource utilization. The use of live virtual machine (VM) migration has enabled more effective ...
Emmanuel Arzuaga, David R. Kaeli
CHI
2008
ACM
16 years 5 months ago
What drives content tagging: the case of photos on Flickr
We examine tagging behavior on Flickr, a public photosharing website. We build on previous qualitative research that exposed a taxonomy of tagging motivations, as well as on socia...
Oded Nov, Mor Naaman, Chen Ye
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
15 years 9 months ago
A Cache Architecture for Modernizing the Usenet Infrastructure
Current Internet users see the combination of World-wide Web (WWW) and electronic mail as a synonym for the Internet. While WWW is excellent for easy and fast dissemination of inf...
Thomas Gschwind, Manfred Hauswirth