Sciweavers

24680 search results - page 4683 / 4936
» Learning
Sort
View
WWW
2010
ACM
14 years 5 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
CGO
2010
IEEE
14 years 5 months ago
Exploiting statistical correlations for proactive prediction of program behaviors
This paper presents a finding and a technique on program behavior prediction. The finding is that surprisingly strong statistical correlations exist among the behaviors of diffe...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Feng Mao, ...
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
14 years 5 months ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak
ASPLOS
2010
ACM
14 years 5 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
CHI
2010
ACM
14 years 5 months ago
Worlds of information: designing for engagement at a public multi-touch display
In designing for engagement at a public multi-touch installation, we identified supporting multiple users and allowing for gradual discovery as challenges. In this paper, we prese...
Giulio Jacucci, Ann Morrison, Gabriela T. Richard,...
« Prev « First page 4683 / 4936 Last » Next »