Sciweavers

7984 search results - page 1251 / 1597
» Exploring personal information
Sort
View
DOLAP
2007
ACM
15 years 8 months ago
Optimal chunking of large multidimensional arrays for data warehousing
ss domain. Using this more abstract approach means that more data sources of varying types can be incorporated with less effort, and such heterogeneous data sources might be very r...
Ekow J. Otoo, Doron Rotem, Sridhar Seshadri
ECRIME
2007
15 years 8 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ACMIDC
2009
15 years 8 months ago
Designing intergenerational mobile storytelling
Informal educational experiences with grandparents and other older adults can be an important component of childrens education, especially in circumstances where high quality educ...
Allison Druin, Benjamin B. Bederson, Alexander J. ...
KDD
2010
ACM
190views Data Mining» more  KDD 2010»
15 years 8 months ago
User browsing models: relevance versus examination
There has been considerable work on user browsing models for search engine results, both organic and sponsored. The click-through rate (CTR) of a result is the product of the prob...
Ramakrishnan Srikant, Sugato Basu, Ni Wang, Daryl ...
EXPCS
2007
15 years 8 months ago
Introducing entropies for representing program behavior and branch predictor performance
Predictors are inherent components of state-of-the-art microprocessors. Branch predictors are discussed actively from diverse perspectives. Performance of a branch predictor large...
Takashi Yokota, Kanemitsu Ootsu, Takanobu Baba
« Prev « First page 1251 / 1597 Last » Next »