Sciweavers

1998 search results - page 290 / 400
» Basic Association Rules
Sort
View
WWW
2001
ACM
14 years 10 months ago
Using Characters to Engage and Teach Novice Web Users: A Case Study
Starpoint Solutions was contracted by a major North American bank to design, develop, and usability test a series of five Web-based, interactive lessons teaching low- to middle-in...
Andrea H. Berman
KDD
2002
ACM
110views Data Mining» more  KDD 2002»
14 years 10 months ago
A model for discovering customer value for E-content
There exists a huge demand for multimedia goods and services in the Internet. Currently available bandwidth speeds can support sale of downloadable content like CDs, e-books, etc....
Srinivasan Jagannathan, Jayanth Nayak, Kevin C. Al...
VLSID
2007
IEEE
104views VLSI» more  VLSID 2007»
14 years 10 months ago
Customization of Register File Banking Architecture for Low Power
Register file banking is an effective alternative to monolithic register files in embedded processor based systems. In this work, we propose techniques for performing application s...
Rakesh Nalluri, Rohan Garg, Preeti Ranjan Panda
ICFP
2001
ACM
14 years 10 months ago
Down with Emacs Lisp: Dynamic Scope Analysis
It is possible to translate code written in Emacs Lisp or another Lisp dialect which uses dynamic scoping to a more modern programming language with lexical scoping while largely ...
Matthias Neubauer, Michael Sperber
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 7 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee