Sciweavers

7984 search results - page 1497 / 1597
» Exploring personal information
Sort
View
SIGSOFT
2010
ACM
13 years 8 months ago
Software intelligence: the future of mining software engineering data
Mining software engineering data has emerged as a successful research direction over the past decade. In this position paper, we advocate Software Intelligence (SI) as the future ...
Ahmed E. Hassan, Tao Xie
SOCIALCOM
2010
13 years 8 months ago
Failure Feedback for User Obligation Systems
In recent years, several researchers have proposed techniques for providing users with assistance in understanding and overcoming authorization denials. The incorporation of envir...
Murillo Pontual, Keith Irwin, Omar Chowdhury, Will...
UIST
2010
ACM
13 years 8 months ago
Enhanced area cursors: reducing fine pointing demands for people with motor impairments
Computer users with motor impairments face major challenges with conventional mouse pointing. These challenges are mostly due to fine pointing corrections at the final stages of t...
Leah Findlater, Alex Jansen, Kristen Shinohara, Mo...
ICCAD
2009
IEEE
179views Hardware» more  ICCAD 2009»
13 years 7 months ago
Automatic memory partitioning and scheduling for throughput and power optimization
Hardware acceleration is crucial in modern embedded system design to meet the explosive demands on performance and cost. Selected computation kernels for acceleration are usually ...
Jason Cong, Wei Jiang, Bin Liu, Yi Zou
WWW
2011
ACM
13 years 5 months ago
Limiting the spread of misinformation in social networks
In this work, we study the notion of competing campaigns in a social network. By modeling the spread of influence in the presence of competing campaigns, we provide necessary too...
Ceren Budak, Divyakant Agrawal, Amr El Abbadi
« Prev « First page 1497 / 1597 Last » Next »