Sciweavers

7352 search results - page 1394 / 1471
» Universal access to information
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 9 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
CHI
2007
ACM
14 years 9 months ago
Multiple mice for retention tasks in disadvantaged schools
This study evaluates single-mouse and multiple-mouse configurations for computer-aided learning in schools where access to computers is limited due to resource constraints. Multim...
Udai Singh Pawar, Joyojeet Pal, Rahul Gupta, Kenta...
CHI
2007
ACM
14 years 9 months ago
Social practices in location-based collecting
The use of location-based technology to augment visitor experiences has received considerable attention over the years. In this paper, we take an alternative perspective on these ...
Kenton O'Hara, Tim Kindberg, Maxine Glancy, Lucian...
CHI
2005
ACM
14 years 9 months ago
Extending tangible interfaces for education: digital montessori-inspired manipulatives
This paper introduces a new framework for thinking about tangible interfaces in education, with specific focus on problem domains. Manipulatives are physical objects specifically ...
Oren Zuckerman, Saeed Arida, Mitchel Resnick
HPCA
2008
IEEE
14 years 9 months ago
Thread-safe dynamic binary translation using transactional memory
Dynamic binary translation (DBT) is a runtime instrumentation technique commonly used to support profiling, optimization, secure execution, and bug detection tools for application...
JaeWoong Chung, Michael Dalton, Hari Kannan, Chris...
« Prev « First page 1394 / 1471 Last » Next »