Sciweavers

4761 search results - page 700 / 953
» Generalizing Boundary Points
Sort
View
GROUP
2005
ACM
15 years 10 months ago
Uncovering privacy attitudes and practices in instant messaging
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
Sameer Patil, Alfred Kobsa
ISLPED
2005
ACM
108views Hardware» more  ISLPED 2005»
15 years 10 months ago
Replacing global wires with an on-chip network: a power analysis
This paper explores the power implications of replacing global chip wires with an on-chip network. We optimize network links by varying repeater spacing, link pipelining, and volt...
Seongmoo Heo, Krste Asanovic
ITICSE
2005
ACM
15 years 10 months ago
eFuzion: development of a pervasive educational system
Established as a research project at the University of Illinois in the spring of 2002, eFuzion has proven to be a valuable and effective pedagogical set of tools. It provides the ...
Chad Peiper, David Warden, Ellick Chan, Boris Capi...
IUI
2005
ACM
15 years 10 months ago
An agent-based approach to dialogue management in personal assistants
Personal assistants need to allow the user to interact with the system in a flexible and adaptive way such as through spoken language dialogue. In this research we focus on an ap...
Anh Nguyen, Wayne Wobcke
MINENET
2005
ACM
15 years 10 months ago
Topographical proximity for mining network alarm data
Increasingly powerful fault management systems are required to ensure robustness and quality of service in today’s networks. In this context, event correlation is of prime impor...
Ann Devitt, Joseph Duffin, Robert Moloney