Sciweavers

362 search results - page 26 / 73
» Making the Most of Cache Groups
Sort
View
ECIS
2004
14 years 11 months ago
The overconfidence effect and IT professionals
Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...
Glen L. Van der Vyver
CHI
2003
ACM
15 years 10 months ago
Marked for deletion: an analysis of email data
What characteristics of an email message make it more likely to be discarded? Statistical analyses of a set of deleted and non-deleted messages revealed several factors that were ...
Laura Dabbish, Gina Danielle Venolia, Jonathan J. ...
ICPR
2010
IEEE
14 years 7 months ago
Speaker Change Detection Based on the Pairwise Distance Matrix
Speaker change detection is most commonly done by statistically determining whether the two adjacent segments of a speech stream are significantly different or not. In this paper, ...
Jin S. Seo
CGO
2006
IEEE
15 years 3 months ago
Selecting Software Phase Markers with Code Structure Analysis
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Jeremy Lau, Erez Perelman, Brad Calder
JPDC
2006
133views more  JPDC 2006»
14 years 9 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...