Sciweavers

557 search results - page 21 / 112
» Two experiences designing for effective security
Sort
View
CSCW
2012
ACM
12 years 4 months ago
Markup as you talk: establishing effective memory cues while still contributing to a meeting
Meeting participants can experience cognitive overload when they need both to verbally contribute to ongoing discussion while simultaneously creating notes to promote later recall...
Steve Whittaker, Vaiva Kalnikaité, Patrick ...
CHI
2009
ACM
14 years 9 months ago
More than face-to-face: empathy effects of video framing
Video conferencing attempts to convey subtle cues of face-to-face interaction (F2F), but it is generally believed to be less effective than F2F. We argue that careful design based...
David T. Nguyen, John F. Canny
CF
2007
ACM
14 years 18 days ago
An analysis of the effects of miss clustering on the cost of a cache miss
In this paper we describe a new technique, called pipeline spectroscopy, and use it to measure the cost of each cache miss. The cost of a miss is displayed (graphed) as a histogra...
Thomas R. Puzak, Allan Hartstein, Philip G. Emma, ...
SIGIR
2010
ACM
14 years 15 days ago
Effective music tagging through advanced statistical modeling
Music information retrieval (MIR) holds great promise as a technology for managing large music archives. One of the key components of MIR that has been actively researched into is...
Jialie Shen, Wang Meng, Shuichang Yan, HweeHwa Pan...
IMC
2010
ACM
13 years 6 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...