Sciweavers

22 search results - page 4 / 5
» Understanding Digital Cardwall Usage
Sort
View
DSS
2008
133views more  DSS 2008»
13 years 7 months ago
A semantic-expansion approach to personalized knowledge recommendation
The rapid propagation of the Internet and information technologies has changed the nature of many industries. Fast response and personalized recommendations have become natural tr...
Ting-Peng Liang, Yung-Fang Yang, Deng-Neng Chen, Y...
MICRO
2009
IEEE
144views Hardware» more  MICRO 2009»
14 years 2 months ago
Characterizing flash memory: anomalies, observations, and applications
Despite flash memory’s promise, it suffers from many idiosyncrasies such as limited durability, data integrity problems, and asymmetry in operation granularity. As architects, ...
Laura M. Grupp, Adrian M. Caulfield, Joel Coburn, ...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 8 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...
POPL
2005
ACM
14 years 7 months ago
Mutatis mutandis: safe and predictable dynamic software updating
Dynamic software updates can be used to fix bugs or add features to a running program without downtime. Essential for some applications and convenient for others, low-level dynami...
Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman,...
SENSYS
2004
ACM
14 years 26 days ago
Simulating the power consumption of large-scale sensor network applications
Developing sensor network applications demands a new set of tools to aid programmers. A number of simulation environments have been developed that provide varying degrees of scala...
Victor Shnayder, Mark Hempstead, Bor-rong Chen, Ge...