Sciweavers

6952 search results - page 1386 / 1391
» The information integrity imperative
Sort
View
CHI
2011
ACM
12 years 11 months ago
Towards a design model for women's empowerment in the developing world
Pulitzer Prize-winning journalist Nicholas Kristof argues that “in this century the paramount moral challenge will be the struggle for gender equality around the world.” In th...
Geeta Shroff, Matthew Kam
CSCW
2011
ACM
12 years 11 months ago
Real-time groupware in the browser: testing the performance of web-based networking
Standard web browsers are becoming a common platform for delivering groupware applications, but until recently, the only way to support real-time collaboration was with browser pl...
Carl A. Gutwin, Michael Lippold, T. C. Nicholas Gr...
FUIN
2011
358views Cryptology» more  FUIN 2011»
12 years 11 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
ICSE
2011
IEEE-ACM
12 years 11 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
IEPOL
2011
43views more  IEPOL 2011»
12 years 11 months ago
Evidence of a modest price decline in US broadband services
In this paper, we construct a price index for broadband services in the United States between 2004 and 2009. We analyze over 1500 service contracts offered by DSL and cable provid...
Shane Greenstein, Ryan McDevitt
« Prev « First page 1386 / 1391 Last » Next »