Sciweavers

6884 search results - page 1330 / 1377
» The macro-structure of use of help
Sort
View
CHI
2009
ACM
14 years 8 months ago
Cell phone software aiding name recall
Senior citizens often find it difficult to remember names. This paper describes a novel cell phone application that uses information about one's social network and the places...
Kent Fenwick, Michael Massimi, Ronald Baecker, San...
CHI
2009
ACM
14 years 8 months ago
Supporting carers in their caring role through design
Carers are people who look after family, partners or friends who could not manage without them because of frailness, illness or disability. Our contribution is to show the potenti...
Andrea Taylor, Richard Wilson, Stefan Agamanolis
HPCA
2009
IEEE
14 years 8 months ago
Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics
The shrinking processor feature size, lower threshold voltage and increasing clock frequency make modern processors highly vulnerable to transient faults. Architectural Vulnerabil...
Lide Duan, Bin Li, Lu Peng
KDD
2008
ACM
206views Data Mining» more  KDD 2008»
14 years 8 months ago
Identifying biologically relevant genes via multiple heterogeneous data sources
Selection of genes that are differentially expressed and critical to a particular biological process has been a major challenge in post-array analysis. Recent development in bioin...
Zheng Zhao, Jiangxin Wang, Huan Liu, Jieping Ye, Y...
KDD
2008
ACM
116views Data Mining» more  KDD 2008»
14 years 8 months ago
Volatile correlation computation: a checkpoint view
Recent years have witnessed increased interest in computing strongly correlated pairs in very large databases. Most previous studies have been focused on static data sets. However...
Wenjun Zhou, Hui Xiong
« Prev « First page 1330 / 1377 Last » Next »