Sciweavers

JECR
2002
133views more  JECR 2002»
13 years 4 months ago
A Cross-Cultural Study on the Value Structure of Mobile Internet Usage: Comparison Between Korea and Japan
As the mobile Internet has been used explosively worldwide, the effects of cultural factors on mobile Internet have been an interesting issue. The objectives of this study are to ...
Yeonsoo Lee, Jinwoo Kim, Inseong Lee, Hoyoung Kim
SOCRATES
2008
13 years 6 months ago
iVideo - Interactive Videos as an Instrument for E-Learning and Knowledge Construction
As a multitude of studies has already revealed, illustrations can be profitably used to convey knowledge. While the importance of videos continues to increase on the internet, we ...
Franz Lehner, Christian Roßnagel
AVI
2008
13 years 7 months ago
SyncDecor: communication appliances for virtual cohabitation
Despite the fact that various means of communication such as mobile phones, instant messenger and e-mail are now widespread; many romantic couples separated by long distances worr...
Hitomi Tsujita, Koji Tsukada, Itiro Siio
COOPIS
2004
IEEE
13 years 8 months ago
Dynamic Adaptation of Data Distribution Policies in a Shared Data Space System
Increasing demands for interconnectivity, adaptivity and flexibility are leading to distributed component-based systems (DCBS) where components may dynamically join and leave a sys...
Giovanni Russello, Michel R. V. Chaudron, Maarten ...
EWMF
2003
Springer
13 years 9 months ago
Monitoring the Evolution of Web Usage Patterns
Abstract With the ongoing shift from off-line to on-line business processes, the Web has become an important business platform, and for most companies it is crucial to have an on-...
Steffan Baron, Myra Spiliopoulou
PAKDD
2004
ACM
127views Data Mining» more  PAKDD 2004»
13 years 10 months ago
Exploiting Recurring Usage Patterns to Enhance Filesystem and Memory Subsystem Performance
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...
Benjamin Rutt, Srinivasan Parthasarathy
ICWE
2004
Springer
13 years 10 months ago
Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining
Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more comple...
Long Wang 0002, Christoph Meinel
IPPS
2008
IEEE
13 years 11 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
SIGSOFT
2009
ACM
13 years 11 months ago
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific protocols, for example certain orders of method calls and/or control structure constraints...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...