Sciweavers

14348 search results - page 2597 / 2870
» Active Database Systems
Sort
View
WWW
2006
ACM
16 years 5 months ago
Selective early request termination for busy internet services
Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies a load shedding mechanism called...
Jingyu Zhou, Tao Yang
ASPLOS
2009
ACM
16 years 5 months ago
Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging
Software defects, commonly known as bugs, present a serious challenge for system reliability and dependability. Once a program failure is observed, the debugging activities to loc...
Martin Dimitrov, Huiyang Zhou
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 5 months ago
Structured learning for non-smooth ranking losses
Learning to rank from relevance judgment is an active research area. Itemwise score regression, pairwise preference satisfaction, and listwise structured learning are the major te...
Soumen Chakrabarti, Rajiv Khanna, Uma Sawant, Chir...
CHI
2005
ACM
16 years 5 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
CHI
2005
ACM
16 years 5 months ago
Attention-based design of augmented reality interfaces
The objects and surfaces of a task-based environment can be layered with digital interfaces to make them easier and safer to use. Once information can be projected anywhere in the...
Leonardo Bonanni, Chia-Hsun Lee, Ted Selker
« Prev « First page 2597 / 2870 Last » Next »