Sciweavers

524 search results - page 90 / 105
» Why phishing works
Sort
View
CHI
2010
ACM
14 years 4 months ago
Now let me see where i was: understanding how lifelogs mediate memory
Lifelogging technologies can capture both mundane and important experiences in our daily lives, resulting in a rich record of the places we visit and the things we see. This study...
Vaiva Kalnikaité, Abigail Sellen, Steve Whi...
TEI
2010
ACM
170views Hardware» more  TEI 2010»
14 years 4 months ago
Swing that thing: moving to move
Swing That Thing… is a practice-based doctoral research project that examines how technology in on and around the body might be used to poeticise experience. Outcomes include a ...
Danielle Wilde
ICC
2009
IEEE
120views Communications» more  ICC 2009»
14 years 4 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
ARCS
2009
Springer
14 years 4 months ago
Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture
The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software c...
Joseph Gebis, Leonid Oliker, John Shalf, Samuel Wi...
WWW
2010
ACM
14 years 4 months ago
Actively predicting diverse search intent from user browsing behaviors
This paper is concerned with actively predicting search intent from user browsing behavior data. In recent years, great attention has been paid to predicting user search intent. H...
Zhicong Cheng, Bin Gao, Tie-Yan Liu