Sciweavers

1524 search results - page 112 / 305
» Assessing Instructional Technology
Sort
View
118
Voted
IRI
2006
IEEE
15 years 9 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
123
Voted
ICALT
2005
IEEE
15 years 9 months ago
An Empirical Exploration of Using Wiki in an English as a Second Language Course
In this paper, we present an empirical study of using a new and cost-effective Web-based collaboration software, Wiki, in a freshman-level English as a second language (ESL) cours...
Hao-Chuan Wang, Chun-Hung Lu, Jun-Yi Yang, Hsin-We...
142
Voted
ISCA
2005
IEEE
166views Hardware» more  ISCA 2005»
15 years 9 months ago
Increased Scalability and Power Efficiency by Using Multiple Speed Pipelines
One of the most important problems faced by microarchitecture designers is the poor scalability of some of the current solutions with increased clock frequencies and wider pipelin...
Emil Talpes, Diana Marculescu
129
Voted
SIGIR
2003
ACM
15 years 9 months ago
Re-examining the potential effectiveness of interactive query expansion
Much attention has been paid to the relative effectiveness of interactive query expansion versus automatic query expansion. Although interactive query expansion has the potential ...
Ian Ruthven
150
Voted
IPPS
2002
IEEE
15 years 8 months ago
Hierarchical Interconnects for On-Chip Clustering
In the sub-micron technology era, wire delays are becoming much more important than gate delays, making it particularly attractive to go for clustered designs. A common form of cl...
Aneesh Aggarwal, Manoj Franklin