We study the use of a computer application, intended for Computer Assisted Language Learning (CALL). We present an analytical framework for CALL, consisting of technology, interac...
Abstract. It is common to think of a "learner model" as a global description of a student's understanding of domain content. We propose a notion of learner model whe...
Gordon I. McCalla, Julita Vassileva, Jim E. Greer,...
The future Large Hadron Collider (LHC) to be built at CERN1, by the turn of the millenium, provides an ample source of challenging real-time computational problems. We report here...
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...
We evaluate the leakage reduction for both instruction and data cache in presence of drowsy or decay techniques. We discovered that a filter cache, traditionally used for reducing...