Sciweavers

1524 search results - page 112 / 305
» Assessing Instructional Technology
Sort
View
IRI
2006
IEEE
14 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ICALT
2005
IEEE
14 years 2 months ago
An Empirical Exploration of Using Wiki in an English as a Second Language Course
In this paper, we present an empirical study of using a new and cost-effective Web-based collaboration software, Wiki, in a freshman-level English as a second language (ESL) cours...
Hao-Chuan Wang, Chun-Hung Lu, Jun-Yi Yang, Hsin-We...
ISCA
2005
IEEE
166views Hardware» more  ISCA 2005»
14 years 2 months ago
Increased Scalability and Power Efficiency by Using Multiple Speed Pipelines
One of the most important problems faced by microarchitecture designers is the poor scalability of some of the current solutions with increased clock frequencies and wider pipelin...
Emil Talpes, Diana Marculescu
SIGIR
2003
ACM
14 years 2 months ago
Re-examining the potential effectiveness of interactive query expansion
Much attention has been paid to the relative effectiveness of interactive query expansion versus automatic query expansion. Although interactive query expansion has the potential ...
Ian Ruthven
IPPS
2002
IEEE
14 years 2 months ago
Hierarchical Interconnects for On-Chip Clustering
In the sub-micron technology era, wire delays are becoming much more important than gate delays, making it particularly attractive to go for clustered designs. A common form of cl...
Aneesh Aggarwal, Manoj Franklin