Sciweavers

290 search results - page 51 / 58
» A Study of Branch Prediction Strategies
Sort
View
SAC
2004
ACM
15 years 3 months ago
Statistical properties of transactional databases
Most of the complexity of common data mining tasks is due to the unknown amount of information contained in the data being mined. The more patterns and correlations are contained ...
Paolo Palmerini, Salvatore Orlando, Raffaele Pereg...
CHI
2000
ACM
15 years 2 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...
RTCSA
1999
IEEE
15 years 1 months ago
Bandwidth Reservation for Real Time Traffic in Wireless Mobile Environment
This study proposes a new bandwidth reservation strategy (Two Level Guarantee) in wireless environment based on the user mobility specification which is assumed to be given at cal...
Byung-Kyu Choi, Riccardo Bettati
SPAA
1990
ACM
15 years 1 months ago
Analysis of Multithreaded Architectures for Parallel Computing
Multithreading has been proposed as an architectural strategy for tolerating latency in multiprocessors and, through limited empirical studies, shown to offer promise. This paper ...
Rafael H. Saavedra-Barrera, David E. Culler, Thors...
ECRIME
2007
15 years 1 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...