Sciweavers

20017 search results - page 282 / 4004
» Using personas effectively
Sort
View
ISSS
2002
IEEE
133views Hardware» more  ISSS 2002»
15 years 9 months ago
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems
This paper presents a novel low-energy memory design technique, considering effective bitwidth of variables for applicationspecific systems, called VAbM technique. It targets th...
Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma,...
CEC
2009
IEEE
15 years 9 months ago
Conformity and network effects in the Prisoner's Dilemma
— We study the evolution of cooperation using the Prisoner’s Dilemma as a metaphor of the tensions between cooperators and non-cooperators, and evolutionary game theory as the ...
José María Peña, Enea Pestela...
RECSYS
2009
ACM
15 years 9 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
CIKM
2000
Springer
15 years 9 months ago
Analyzing the Effectiveness and Applicability of Co-training
Recently there has been significant interest in supervised learning algorithms that combine labeled and unlabeled data for text learning tasks. The co-training setting [1] applie...
Kamal Nigam, Rayid Ghani
IEEEPACT
1999
IEEE
15 years 9 months ago
A Cost-Effective Clustered Architecture
In current superscalar processors, all floating-point resources are idle during the execution of integer programs. As previous works show, this problem can be alleviated if the fl...
Ramon Canal, Joan-Manuel Parcerisa, Antonio Gonz&a...