Sciweavers

3276 search results - page 577 / 656
» Data Management for Pervasive Computing
Sort
View
HICSS
2006
IEEE
138views Biometrics» more  HICSS 2006»
14 years 3 months ago
An Efficient Algorithm for Real-Time Frequent Pattern Mining for Real-Time Business Intelligence Analytics
Finding frequent patterns from databases has been the most time consuming process in data mining tasks, like association rule mining. Frequent pattern mining in real-time is of in...
Rajanish Dass, Ambuj Mahanti
RTSS
2006
IEEE
14 years 3 months ago
Delay Analysis in Temperature-Constrained Hard Real-Time Systems with General Task Arrivals
In this paper, we study temperature-constrained hard realtime systems, where real-time guarantees must be met without exceeding safe temperature levels within the processor. Dynam...
Shengquan Wang, Riccardo Bettati
CSCW
2006
ACM
14 years 3 months ago
Interruptions on software teams: a comparison of paired and solo programmers
This study explores interruption patterns among software developers who program in pairs versus those who program solo. Ethnographic observations indicate that interruption length...
Jan Chong, Rosanne Siino
SIGCSE
2006
ACM
133views Education» more  SIGCSE 2006»
14 years 3 months ago
Student progress monitoring tool using treeview
In this paper, we present an extensible visualization tool that is being used in a web-based closed laboratory system. The goal of this project is to provide a tool for both stude...
Jungsoon P. Yoo, Sung K. Yoo, Chris Lance, Judy Ha...
SOUPS
2006
ACM
14 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...