Restricted Area  |


  1. M. Ackerman, “The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility,” Human-Computer Interaction, vol. 15, pp. 179-203, 2000.
  2. E. Albergaria, F. Mourão, R. Prates, and W. Meira Jr., “An End User Development Model to Augment Usability of Rule Association Mining Systems,” in Proceedings of the 20th IFIP International Federation for Information Processing/1st Human-Computer Interaction Symposium, 2008, pp. 161-174.
  3. H. M. Almeida, M. A. Gonçalves, M. Cristo, and P. Calado, “A combined component approach for finding collection-adapted ranking functions based on genetic programming,” in Proceedings of The 30th Annual International ACM SIGIR Conference (SIGIR’07), 2007, pp.399-406.
  4. J. M. Almeida, J. Krueger, D. L. Eager, and M. K. Vernon, “Analysis of educational media server workloads,” in Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video (NOSSDAV’01), New York, NY, USA, 2001, pp. 21-30.
  5. O. Alonso, M. Gertz, and R. Baeza-Yates, “On the value of temporal information in information retrieval,” Proceedings of The 30th Annual International ACM SIGIR Conference (SIGIR’07), vol. 41, pp. 35-41, 2007.
  6. R. B. Araújo, G. H. T. Ferreira, G. H. Orair, W. Meira Jr., R. A. C. Ferreira, D. O. G. Neto, and M. J. Zaki, “The ParTriCluster Algorithm for Gene Expression Analysis,” International Journal of Parallel Programming, vol. 36, pp. 226-249, 2008.
  7. M. F. Arlitt and C. L. Williamson, “Web server workload characterization: the search for invariants,” ACM SIGMETRICS Performance Evaluation Review, vol. 24, pp. 126-137, 1996.
  8. G. T. Assis, A. H. F. Laender, A. S. d. Silva, and M. A. Gonçalves, “The impact of term selection in genre-aware focused crawling,” in Proceedings of The 23rd ACM Symposium on Applied Computing (SAC’08), 2008, pp. 1158-1163.
  9. C. M. d. A. Barbosa, R. O. Prates, and C. S. d. Souza, “Identifying Potential Social Impact of Collaborative Systems at Design Time,” in Proceedings of the eleventh IFIP TC13 International Conference on Human-Computer Interaction (INTERACT’07), 2007, pp. 31-44.
  10. F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, C. Zhang, and K. Ross, “Identifying Video Spammers in Online Social Networks,” in Proceedings of the International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), Beijim, China, 2008.
  11. S. S. Bhowmick, S. K. Madria, and W. K. Ng, Web Data Management – A Warehouse Approach. Berlin, Germany: Springer, 2004.
  12. E. Albergaria, F. Mourão, R. Prates, and W. Meira Jr., “An End User Development Model to Augment Usability of Rule Association Mining Systems,” in Proceedings of the 20th IFIP International Federation for Information Processing/1st Human-Computer Interaction Symposium, 2008, pp. 161-174.
  13. K. A. V. Borges, A. H. F. Laender, C. B. Medeiros, and C. A. Davis, “Discovering Geographic Locations in Web Pages Using Urban Addresses,” in Proceedings of the 4th ACM Workshop onGeographic Information Retrieval, Lisbon, Portugal, 2007, pp. 31-36.
  14. F. C. Botelho, D. Galinkin, W. Meira Jr., and N. Ziviani, “Distributed Perfect Hashing for Very Large Key Sets,” in Proceedings of the 3rd International ICST Conference on Scalable Information Systems (InfoScale’08), 2008.
  15. F. C. Botelho, R. Pagh, and N. Ziviani, “Simple and Space-Efficient Minimal Perfect Hash Functions,” in Proceedings of the 10th Workshop on Algorithms and Data Structures (WADS’07), 2007, pp. 139-150.
  16. F. C. Botelho and N. Ziviani, “External Perfect Hashing for Very Large Key Sets,” in Proceedings of the 16th ACM Conference on Information and Knowledge Management (CIKM’07), 2007, pp. 653-662.
  17. P. Calado, A. S. Silva, R. Vieira, A. H. F. Laender, and B. Ribeiro-Neto, “A Bayesian NetworkApproach to Searching Databases Through Keyword-based Queries,” Information Processingand Management, vol. 40, pp. 773-790, September 2004.
  18. J. M. Carroll, HCI Models, Theories, and Frameworks : Toward a Multidisciplinary Science(Morgan Kaufmann Series in Interactive Technologies): Morgan Kaufmann, 2003.
  19. J. C. P. Carvalho and A. S. d. Silva, “Finding Similar Identities Among Objects from MultipleWeb Sources,” in Proceedings of the Fifth International Workshop on Web Information andData Management, New Orleans, Louisiana, USA, 2003, pp. 90-93.
  20. C. Chen, “Top 10 Unsolved Information Visualization Problems,” IEEE Computer Graphicsand Applications, vol. 25, pp. 12-16, 2005.
  21. C. P. Costa, I. S. Cunha, A. Borges, C. V. Ramos, M. M. Rocha, J. M. Almeida, and B. Ribeiro-Neto, “Analyzing client interactivity in streaming media,” in Proceedings of the 13thinternational conference on World Wide Web (WWW’04), New York, NY, USA, 2004, pp. 534-543.
  22. T. M. Delboni, K. A. V. Borges, A. H. F. Laender, and C. A. Davis Jr., “Semantic Expansion ofGeographic Web Queries Based on Natural Language Positioning Expressions,” Transactionsin GIS, vol. 11, pp. 377-397, 2007.
  23. C. F. Dorneles, C. A. Heuser, V. M. Orengo, A. S. d. Silva, and E. S. d. Moura, “A strategy forallowing meaningful and comparable scores in approximate matching,” in Proceedings of the16th ACM Conference on Information and Knowledge Management (CIKM’07), 2007, pp. 303-312.
  24. D. W. Embley, D. M. Campbell, Y. S. Jiang, S. W. Liddle, D. W. Lonsdale, Y.-K. Ng, D.Quass, and R. D. Smith, “Conceptual-Model-Based Data Extraction From Multiple-RecordWeb Pages,” Data and Knowledge Engineering, vol. 31, pp. 227-251, 1999.
  25. G. Fischer, “Meta-design: Expanding Boundaries and Redistributing Control in Design,” inProceedings of the eleventh IFIP TC13 International Conference on Human-ComputerInteraction (INTERACT’07), 2007, pp. 193-206.
  26. G. Fischer, E. Giaccardi, Y. Ye, A. G. Sutcliffe, and N. Mehandjiev, “Meta-design: a manifestofor end-user development,” Communications of the ACM, vol. 47, pp. 33-37, 2004.
  27. D. Florescu, “Managing semi-structured data,” ACM Queue, vol. 3, pp. 18-24, 2005.
  28. P. Gill, M. Arlitt, Z. Li, and A. Mahanti, “Youtube traffic characterization: a view from theedge,” in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement(IMC’07), New York, NY, USA, 2007, pp. 15–28.
  29. L. H. Gomes, C. Cazita, J. M. Almeida, V. Almeida, and W. Meira Jr., “Workload models ofspam and legitimate e-mails,” Performance Evaluation, vol. 64, pp. 690-714, 2007.
  30. M. Granovetter, “Threshold Models of Collective Behavior,” The American Journal ofSociology, vol. 83, pp. 1420-1443, 1978.
  31. J. Grudin, “Why CSCW applications fail: problems in the design and evaluation of organizationof organizational interfaces,” in Proceedings of the 1988 ACM conference on Computersupportedcooperative work (CSCW’88), New York, NY, USA, 1988, pp. 85-93.
  32. M. Himmelstein, “Local Search: the Internet is the Yellow Pages,” IEEE Computer, vol. 38, pp.26-34, Feb 2005 2005.
  33. R. Jain, The Art of Computer System Performance Analysis: Techniques for ExperimentalDesign, Measurement, Simulation and Modeling: John Wiley and Sons, 1991.
  34. L. Kleinrock, Theory, Volume 1, Queueing Systems: Wiley-Interscience, 1975.
  35. G. Kossinets and D. J. Watts, “Empirical Analysis of an Evolving Social Network,” ScienceMagazine, vol. 311, pp. 88-90, 2006.
  36. A. Lacerda, M. Cristo, M. A. Gonçalves, W. Fan, N. Ziviani, and B. A. Ribeiro-Neto,”Learning to advertise,” in Proceedings of The 29th Annual International ACM SIGIRConference (SIGIR’06), 2006, pp. 549-556.
  37. A. H. F. Laender, B. A. Ribeiro-Neto, A. S. d. Silva, and J. S. Teixeira, “Brief Survey of WebData Extraction Tools,” SIGMOD Record, vol. 31, pp. 84-93, June 2002.
  38. J. P. Lage, A. S. Silva, P. B. Golgher, and A. H. F. Laender, “Automatic Generation of Agentsfor Collecting Hidden Web Pages for Data Extraction,” Data and Knowledge Engineering, vol.49, pp. 177-196, 2004.
  39. S. Loh, F. Lorenzi, G. Simões, L. K. Wives, and J. P. M. d. Oliveira, “Comparing keywords andtaxonomies in the representation of users profiles in a content-based recommender system,” inProceedings of the 23rd ACM symposium on Applied computing (SAC’08), New York, NY,USA, 2008, pp. 2030-2034.
  40. M. A. Maia, J. M. Almeida, and V. Almeida, “Identifying User Behavior in Online SocialNetworks,” in Procedings of The First ACM/Eurosys International Workshop on SocialNetwork Systems, Glasgow, United Kingdom, 2008.
  41. K. McCurley, “Geospatial mapping and navigation on the Web,” in Proceedings of the 10thInternational World Wide Web Conference (WWW’01), Hong Kong, China, 2001, pp. 221-229.
  42. S. Mitra, S. K. Pal, and P. Mitra, “Data mining in soft computing framework: a survey,” IEEETransactions on Neural Networks, vol. 13, pp. 3-14, Jan 2002.
  43. J. Moody, “The importance of relationship timing for diffusion: indirect connectivity and STDinfection risk,” Social Forces, vol. 81, pp. 25-26, 2002.
  44. M. M. Moro, P. Bakalov, and V. J. Tsotras, “Early Profile Pruning on XML-awarePublish/Subscribe Systems,” in Proceedings of the 33rd International Conference on VeryLarge Data Bases (VLDB’07), 2007, pp. 866-877.
  45. H. T. M. Neto, J. M. Almeida, L. C. D. Rocha, W. Meira Jr., P. H. C. Guerra, and V. A. F.Almeida, “A characterization of broadband user behavior and their e-business activities,” ACMSIGMETRICS Performance Evaluation Review, vol. 32, pp. 3-13, 2004.
  46. M. E. J. Newman, D. J. Watts, and S. H. Strogatz, “Random graph models of social networks,”Proceedings of the National Academy of Sciences USA, vol. 99, pp. 2566-2572, 2002.
  47. J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz, and A. L.Barabasi, “Structure and tie strengths in mobile communication networks,” Proceedings of theNational Academy of Sciences, vol. 104, pp. 7332-7336, May 2007.
  48. V. M. Orengo and C. Huyck, “Relevance feedback and cross-language information retrieval,”Information Processing and Management, vol. 42, pp. 1203-1217, 2006.
  49. B. Palla, A.-L. Barabási, and T. Vicsek, “Quantifying social group evolution,” Nature, vol. 446,pp. 664-667, 2007.
  50. J. Preece, Online Communities: Designing Usability and Supporting Socialbilty. New York,NY, USA: John Wiley and Sons Inc., 2000.
  51. J. Preece, “Etiquette online: from nice to necessary,” Communications of the ACM, vol. 47, pp.56-61, 2004.
  52. M. Sanderson and J. Kohler, “Analyzing Geographic Queries,” in Proceedings of the Workshopon Geographic Information Retrieval, Sheffield, UK, 2004.
  53. W. Santos, T. Teixeira, C. Machado, W. Meira Jr., R. Ferreira, D. O. G. Neto, and A. S. d.Silva, “A Scalable Parallel Deduplication Algorithm,” in Proceedings of the 19th International Symposium on Computer Architecture and High Performance Computing (SBAC’07), 2007, pp.79-86.
  54. R. F. d. Silva and R. O. Prates, “Evaluating Manas in Identifying Social Impact Problems: A Case Study (In Portuguese),” in Anais do VIII Simpósio Brasileiro de Fatores Humanos em Sistemas Computacionais, 2008.
  55. L. A. Souza, C. A. Davis Jr., K. A. V. Borges, T. M. Delboni, and A. H. F. Laender, “The Roleof Gazetteers in Geographic Knowledge Discovery on the Web,” in Proceedings of the 3rdLatin American Web Congress (LAWeb’05), Buenos Aires, Argentina, 2005, pp. 157-165.
  56. A. Veloso, H. M. d. Almeida, M. A. Gonçalves, and W. Meira Jr., “Learning to rank at querytimeusing association rules,” in Proceedings of The 31st Annual International ACM SIGIRConference (SIGIR’08), 2008, pp. 267-274.
  57. A. Veloso, W. Meira Jr., and M. J. Zaki, “Lazy Associative Classification,” in Proceedings of the 6th IEEE International Conference on Data Mining (ICDM’06), 2006, pp. 645-654.
  58. E. Veloso, V. Almeida, W. Meira Jr., A. Bestavros, and S. Jin, “A hierarchical characterizationof a live streaming media workload,” IEEE/ACM Transactions on Networking, vol. 14, pp. 133-146, 2006.
  59. E. C. C. Vilarinho, A. S. d. Silva, M. A. Gonçalves, F. d. S. Mesquita, and E. S. d. Moura,”FLUX-CIM: Flexible Unsupervised Extraction of Citation Metadata,” in Proceedings of the ACM/IEEE 2007 Joint Conference on Digital Libraries, Vancouver, BC, Canada, 2007, pp.215-224.
  60. I. H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniqueswith Java Implementations, 2nd ed.: Morgan Kaufmann, 2005.
  61. H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, “SybilGuard: defending against sybilattacks via social networks,” IEEE/ACM Transactions on Networking, vol. 16, pp. 576-589,2008.
  62. A. Y. Zomaya, J. A. Anderson, D. B. Fogel, and G. J. Milburn, “Nonconventional Computing Paradigms in the New Millennium: A Roundtable,” Computing in Science and Engineering, pp.82-99, 2001.

Diplomas count wraps up decade-long run to build a better high school, coherence is key vt

Copyright © 2010 InWeb - Instituto Nacional de Ciência e Tecnologia para a Web - All rights reserved.
XHTML 1.1 OKXHTML 1.1 CSS 2.1 OKCSS 2.1 razz