Sciweavers

2159 search results - page 392 / 432
» C-K design theory for information systems research
Sort
View
116
Voted
ICS
2010
Tsinghua U.
15 years 12 days ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...
103
Voted
CHI
2009
ACM
16 years 2 months ago
Extraordinary computing: religion as a lens for reconsidering the home
We present results from a study examining how American Protestant Christians' faith affects their domestic life. There are two contributions of this work for the HCI communit...
Susan Wyche, Rebecca E. Grinter
CHI
2009
ACM
16 years 2 months ago
Intentions: a game for classifying search query intent
Knowing the intent of a search query allows for more intelligent ways of retrieving relevant search results. Most of the recent work on automatic detection of query intent uses su...
Edith Law, Anton Mityagin, David Maxwell Chickerin...
AOSD
2009
ACM
15 years 8 months ago
Enforcing security for desktop clients using authority aspects
Desktop client applications interact with both local and remote resources. This is both a benefit in terms of the rich features desktop clients can provide, but also a security r...
Brett Cannon, Eric Wohlstadter
HICSS
2006
IEEE
115views Biometrics» more  HICSS 2006»
15 years 8 months ago
Lookahead Cascade for Table Access on Small Devices
Users increasingly expect access to Web data from a wide range of devices, both wired and wireless. The goal of our research is to inform the design of applications that support d...
Rui Zhang, Carolyn R. Watters, Jack Duffy