Sciweavers

1744 search results - page 189 / 349
» The Steganographic File System
Sort
View
CHI
1993
ACM
15 years 8 months ago
Sifting through hierarchical information
Modern computer users must often sift and manage vast amounts of hierarchically structured information. However, conventional interface tools have not kept pace with the informati...
Doug Schaffer, Saul Greenberg
AIED
2007
Springer
15 years 8 months ago
Domain-Specific and Domain-Independent Interactive Behaviors in Andes
In this study, students studied two different domains in the same Intelligent Tutoring System, Andes. Analysis of 435 log files from 22 subjects indicated that there are two types ...
Min Chi, Kurt VanLehn
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 9 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
129
Voted
OSDI
2006
ACM
16 years 4 months ago
Type-Safe Disks
We present the notion of a type-safe disk (TSD). Unlike a traditional disk system, a TSD is aware of the pointer relationships between disk blocks that are imposed by higher layer...
Gopalan Sivathanu, Swaminathan Sundararaman, Erez ...
107
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
Finding Evidence of Antedating in Digital Investigations
— Finding evidence of antedating is an important goal in many digital investigations. This paper explores how causality can expose antedating by investigating storage systems for...
Svein Yngvar Willassen