Sciweavers

2539 search results - page 489 / 508
» Semantic frameworks for e-government
Sort
View
108
Voted
WWW
2004
ACM
16 years 2 months ago
Dynamic assembly of learning objects
This paper describes one solution to the problem of how to select sequence, and link Web resources into a coherent, focused organization for instruction that addresses a user'...
Robert G. Farrell, Soyini D. Liburd, John C. Thoma...
CHI
2009
ACM
16 years 2 months ago
Squidy: a zoomable design environment for natural user interfaces
We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a ...
Harald Reiterer, Roman Rädle, Werner A. K&oum...
114
Voted
PPOPP
2009
ACM
16 years 2 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha
167
Voted
KDD
2008
ACM
172views Data Mining» more  KDD 2008»
16 years 2 months ago
Structured metric learning for high dimensional problems
The success of popular algorithms such as k-means clustering or nearest neighbor searches depend on the assumption that the underlying distance functions reflect domain-specific n...
Jason V. Davis, Inderjit S. Dhillon
129
Voted
HPCA
2006
IEEE
16 years 2 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...