Sciweavers

1642 search results - page 326 / 329
» A Heuristic Method for Business Process Model Evaluation
Sort
View
LOCA
2007
Springer
15 years 3 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
DAC
2006
ACM
15 years 3 months ago
Signature-based workload estimation for mobile 3D graphics
Until recently, most 3D graphics applications had been regarded as too computationally intensive for devices other than desktop computers and gaming consoles. This notion is rapid...
Bren Mochocki, Kanishka Lahiri, Srihari Cadambi, X...
SENSYS
2006
ACM
15 years 3 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
66
Voted
CCS
2005
ACM
15 years 3 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
CIKM
2003
Springer
15 years 2 months ago
Automated index management for distributed web search
Distributed heterogeneous search systems are an emerging phenomenon in Web search, in which independent topic-specific search engines provide search services, and metasearchers d...
Rinat Khoussainov, Nicholas Kushmerick