Sciweavers

7984 search results - page 1296 / 1597
» Exploring personal information
Sort
View
UIST
2009
ACM
15 years 11 months ago
Disappearing mobile devices
In this paper, we extrapolate the evolution of mobile devices in one specific direction, namely miniaturization. While we maintain the concept of a device that people are aware of...
Tao Ni, Patrick Baudisch
UIST
2009
ACM
15 years 11 months ago
CommunityCommands: command recommendations for software applications
We explore the use of modern recommender system technology to address the problem of learning software applications. Before describing our new command recommender system, we first...
Justin Matejka, Wei Li, Tovi Grossman, George W. F...
UIST
2009
ACM
15 years 11 months ago
Overview based example selection in end user interactive concept learning
Interaction with large unstructured datasets is difficult because existing approaches, such as keyword search, are not always suited to describing concepts corresponding to the di...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...
ASAP
2008
IEEE
142views Hardware» more  ASAP 2008»
15 years 11 months ago
Managing multi-core soft-error reliability through utility-driven cross domain optimization
As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transie...
Wangyuan Zhang, Tao Li
COMPSAC
2008
IEEE
15 years 11 months ago
Measuring Network Security Using Bayesian Network-Based Attack Graphs
Given the increasing dependence of our societies on information systems, the overall security of these systems should be measured and improved. Existing work generally focuses on ...
Marcel Frigault, Lingyu Wang
« Prev « First page 1296 / 1597 Last » Next »