Sciweavers

557 search results - page 71 / 112
» Two experiences designing for effective security
Sort
View
ISCA
2003
IEEE
107views Hardware» more  ISCA 2003»
15 years 5 months ago
Positional Adaptation of Processors: Application to Energy Reduction
Although adaptive processors can exploit application variability to improve performance or save energy, effectively managing their adaptivity is challenging. To address this probl...
Michael C. Huang, Jose Renau, Josep Torrellas
HUC
2003
Springer
15 years 5 months ago
Evaluation of Visual Notification Cues for Ubiquitous Computing
With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-in...
Peter Tarasewich, Christopher S. Campbell, Tian Xi...
HICSS
2002
IEEE
118views Biometrics» more  HICSS 2002»
15 years 4 months ago
Computer-Mediated and Face-to-Face Groups: Who Makes Riskier Decisions?
Although a significant body of research has focused on understanding the effect of media differences on group behaviors and processes, little is known about how media differences ...
Joseph S. Valacich, Saonee Sarker, Jamie Pratt, Mi...
CE
2007
81views more  CE 2007»
14 years 12 months ago
Aptitude-treatment interactions in preservice teachers' behavior change during computer-simulated teaching
Adapting training methods to specific teacher traits to best facilitate the training effects for preservice teachers is an important, yet neglected, topic in aptitude-treatment in...
Yu-Chu Yeh
ICDM
2009
IEEE
181views Data Mining» more  ICDM 2009»
14 years 9 months ago
Efficient Discovery of Frequent Correlated Subgraph Pairs
The recent proliferation of graph data in a wide spectrum of applications has led to an increasing demand for advanced data analysis techniques. In view of this, many graph mining ...
Yiping Ke, James Cheng, Jeffrey Xu Yu