Sciweavers

1029 search results - page 134 / 206
» Dependence Anti Patterns
Sort
View
WWW
2009
ACM
16 years 3 months ago
Behavioral profiles for advanced email features
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend...
Thomas Karagiannis, Milan Vojnovic
WWW
2006
ACM
16 years 3 months ago
Using web browser interactions to predict task
The automatic identification of a user's task has the potential to improve information filtering systems that rely on implicit measures of interest and whose effectiveness ma...
Melanie Kellar, Carolyn R. Watters
WWW
2004
ACM
16 years 3 months ago
E-learning personalization based on itineraries and long-term navigational behavior
In this paper we describe a practical framework for studying the navigational behavior of the users of an e-learning environment integrated in a virtual campus. The students navig...
Enric Mor, Julià Minguillón
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
16 years 3 months ago
Scalable look-ahead linear regression trees
Most decision tree algorithms base their splitting decisions on a piecewise constant model. Often these splitting algorithms are extrapolated to trees with non-constant models at ...
David S. Vogel, Ognian Asparouhov, Tobias Scheffer
VLSID
2007
IEEE
152views VLSI» more  VLSID 2007»
16 years 3 months ago
An Efficient Technique for Leakage Current Estimation in Sub 65nm Scaled CMOS Circuits Based on Loading Effect
With scaling of CMOS technologies, sub-threshold, gate and reverse biased junction band-to-band-tunneling leakage have increased dramatically. Together they account for more than 2...
Ashesh Rastogi, Wei Chen, Alodeep Sanyal, Sandip K...