Sciweavers

2603 search results - page 379 / 521
» Design, use and experience of e-learning systems
Sort
View
ISCA
2012
IEEE
333views Hardware» more  ISCA 2012»
12 years 20 days ago
Reducing memory reference energy with opportunistic virtual caching
Most modern cores perform a highly-associative translation look aside buffer (TLB) lookup on every memory access. These designs often hide the TLB lookup latency by overlapping it...
Arkaprava Basu, Mark D. Hill, Michael M. Swift
ICDE
2000
IEEE
121views Database» more  ICDE 2000»
14 years 11 months ago
Creating a Customized Access Method for Blobworld
We present the design and analysis of a customized access method for the content-based image retrieval system, Blobworld. Using the amdb access method analysis tool, we analyzed t...
Megan Thomas, Chad Carson, Joseph M. Hellerstein
CHI
2005
ACM
14 years 10 months ago
Pollen: promoting the exchange of meaningful objects
One of the most trying aspects of growing old is the loss of loved ones. Older people often experience depression as a result of this reality. Without regular contact from friends...
Stefanie Danhope-Smith, Payaal Patel
SIGMOD
2008
ACM
150views Database» more  SIGMOD 2008»
14 years 10 months ago
Query biased snippet generation in XML search
Snippets are used by almost every text search engine to complement ranking scheme in order to effectively handle user searches, which are inherently ambiguous and whose relevance ...
Yu Huang, Ziyang Liu, Yi Chen
CHI
2010
ACM
14 years 5 months ago
Deception and magic in collaborative interaction
We explore the ways in which interfaces can be designed to deceive users so as to create the illusion of magic. We present a study of an experimental performance in which a magici...
Joe Marshall, Steve Benford, Tony P. Pridmore