Sciweavers

13618 search results - page 2599 / 2724
» The Newton Operating System
Sort
View
120
Voted
CHI
2009
ACM
16 years 4 months ago
It's not that important: demoting personal information of low subjective importance using GrayArea
Users find it hard to delete unimportant personal information which often results in cluttered workspaces. We present a full design cycle for GrayArea, a novel interface that allo...
Ofer Bergman, Simon Tucker, Ruth Beyth-Marom, Edwa...
160
Voted
HPCA
2009
IEEE
16 years 4 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
145
Voted
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
16 years 4 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
124
Voted
KDD
2008
ACM
153views Data Mining» more  KDD 2008»
16 years 4 months ago
Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry
Text classification has matured as a research discipline over the last decade. Independently, business intelligence over structured databases has long been a source of insights fo...
Shantanu Godbole, Shourya Roy
111
Voted
CHI
2008
ACM
16 years 4 months ago
Targeting across displayless space
Multi-monitor displays and multi-display environments are now common. Cross-display cursor movement, in which a user moves the pointer from one display to another, occurs frequent...
Miguel A. Nacenta, Regan L. Mandryk, Carl Gutwin
« Prev « First page 2599 / 2724 Last » Next »