Sciweavers

1860 search results - page 265 / 372
» tools 2009
Sort
View
87
Voted
ISEUD
2009
Springer
15 years 7 months ago
Males' and Females' Script Debugging Strategies
Little research has addressed IT professionals’ script debugging strategies, or considered whether there may be gender differences in these strategies. What strategies do male an...
Valentina Grigoreanu, James Brundage, Eric Bahna, ...
119
Voted
ISMIS
2009
Springer
15 years 7 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ISW
2009
Springer
15 years 7 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
100
Voted
IVA
2009
Springer
15 years 7 months ago
A Combined Semantic and Motion Capture Database for Real-Time Sign Language Synthesis
Over the past decade, motion capture data has become a popular research tool, and motion databases have grown exponentially. Indexing, querying, and retrieving data has thus become...
Charly Awad, Nicolas Courty, Kyle Duarte, Thibaut ...
104
Voted
IWMM
2009
Springer
130views Hardware» more  IWMM 2009»
15 years 7 months ago
A component model of spatial locality
Good spatial locality alleviates both the latency and bandwidth problem of memory by boosting the effect of prefetching and improving the utilization of cache. However, convention...
Xiaoming Gu, Ian Christopher, Tongxin Bai, Chengli...