Sciweavers

1029 search results - page 134 / 206
» Dependence Anti Patterns
Sort
View
WWW
2009
ACM
14 years 11 months ago
Behavioral profiles for advanced email features
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend...
Thomas Karagiannis, Milan Vojnovic
WWW
2006
ACM
14 years 11 months ago
Using web browser interactions to predict task
The automatic identification of a user's task has the potential to improve information filtering systems that rely on implicit measures of interest and whose effectiveness ma...
Melanie Kellar, Carolyn R. Watters
WWW
2004
ACM
14 years 11 months ago
E-learning personalization based on itineraries and long-term navigational behavior
In this paper we describe a practical framework for studying the navigational behavior of the users of an e-learning environment integrated in a virtual campus. The students navig...
Enric Mor, Julià Minguillón
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
14 years 10 months ago
Scalable look-ahead linear regression trees
Most decision tree algorithms base their splitting decisions on a piecewise constant model. Often these splitting algorithms are extrapolated to trees with non-constant models at ...
David S. Vogel, Ognian Asparouhov, Tobias Scheffer
VLSID
2007
IEEE
152views VLSI» more  VLSID 2007»
14 years 10 months ago
An Efficient Technique for Leakage Current Estimation in Sub 65nm Scaled CMOS Circuits Based on Loading Effect
With scaling of CMOS technologies, sub-threshold, gate and reverse biased junction band-to-band-tunneling leakage have increased dramatically. Together they account for more than 2...
Ashesh Rastogi, Wei Chen, Alodeep Sanyal, Sandip K...