Sciweavers

8468 search results - page 1572 / 1694
» The Technology of Data Stashing
Sort
View
CHI
1996
ACM
15 years 2 months ago
Email Overload: Exploring Personal Information Management of Email
Email is one of the most successful computer applications yet devised. Our empirical data show however, that although email was originally designed as a communications application...
Steve Whittaker, Candace L. Sidner
VLDB
1992
ACM
138views Database» more  VLDB 1992»
15 years 2 months ago
Experiences With an Object Manager for a Process-Centered Environment
Process-centered software engineering environments, such as Arcadia, impose a variety of requirements on database technology that to date have not been well supported by available...
Dennis Heimbigner
ACMICEC
2007
ACM
303views ECommerce» more  ACMICEC 2007»
15 years 2 months ago
Impact of social influence in e-commerce decision making
Purchasing decisions are often strongly influenced by people who the consumer knows and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters befo...
Young Ae Kim, Jaideep Srivastava
CCS
2007
ACM
15 years 2 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
CIKM
2009
Springer
15 years 1 months ago
Efficient itemset generator discovery over a stream sliding window
Mining generator patterns has raised great research interest in recent years. The main purpose of mining itemset generators is that they can form equivalence classes together with...
Chuancong Gao, Jianyong Wang
« Prev « First page 1572 / 1694 Last » Next »