Sciweavers

2414 search results - page 317 / 483
» Computing Normal Subgroups
Sort
View
KDD
2004
ACM
182views Data Mining» more  KDD 2004»
16 years 2 months ago
Rotation invariant distance measures for trajectories
For the discovery of similar patterns in 1D time-series, it is very typical to perform a normalization of the data (for example a transformation so that the data follow a zero mea...
Michail Vlachos, Dimitrios Gunopulos, Gautam Das
CHI
2007
ACM
16 years 2 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CHI
2006
ACM
16 years 2 months ago
Biasing response in Fitts' Law tasks
Fitts' law, relating the time to acquire a target to the target size and the distance from the target, is an effective and widely used predictor of performance in feedback co...
Emory Al-Imam, Edward Lank
107
Voted
CHI
2005
ACM
16 years 2 months ago
DeDe: design and evaluation of a context-enhanced mobile messaging system
This paper presents the design, implementation and validation of an enhanced mobile phone messaging system (DeDe), allowing the sender to define the context in which the message w...
Younghee Jung, Per Persson, Jan Blom
HPCA
2004
IEEE
16 years 2 months ago
Signature Buffer: Bridging Performance Gap between Registers and Caches
Data communications between producer instructions and consumer instructions through memory incur extra delays that degrade processor performance. In this paper, we introduce a new...
Lu Peng, Jih-Kwon Peir, Konrad Lai