Information Technology has become a core activity in most, if not all, corporations. Although IT managers continue to be under-represented in executive management, the very centra...
What characteristics of an email message make it more likely to be discarded? Statistical analyses of a set of deleted and non-deleted messages revealed several factors that were ...
Laura Dabbish, Gina Danielle Venolia, Jonathan J. ...
Speaker change detection is most commonly done by statistically determining whether the two adjacent segments of a speech stream are significantly different or not. In this paper, ...
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...