Sciweavers

4048 search results - page 640 / 810
» Design Science, Engineering Science and Requirements Enginee...
Sort
View
CHI
2010
ACM
15 years 7 months ago
Contravision: exploring users' reactions to futuristic technology
How can we best explore the range of users' reactions when developing future technologies that maybe controversial, such as personal healthcare systems? Our approach – Cont...
Clara Mancini, Yvonne Rogers, Arosha K. Bandara, T...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
15 years 7 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 7 months ago
Operationalised Business Intelligence: Knowledge Sharing with an Enterprise Ambition at the Amsterdam-Amstelland Police Departme
In this article we describe the operationalised Business Intelligence (BI) environment of the Amsterdam-Amstelland Police Department (AAPD) as it presented itself in the spring of...
Stijn Viaene, Luc Lutin, Steven De Hertogh
ICS
2009
Tsinghua U.
15 years 7 months ago
Adagio: making DVS practical for complex HPC applications
Power and energy are first-order design constraints in high performance computing. Current research using dynamic voltage scaling (DVS) relies on trading increased execution time...
Barry Rountree, David K. Lowenthal, Bronis R. de S...
103
Voted
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 7 months ago
Fine-Grained and Scalable Approaches for Message Integrity
When we have multiple users compiling a single message, including shared contents, metadata, policy, and so on, the integrity of the contents created by individual users needs to ...
Joon S. Park, Ganesh Devarajan