Sciweavers

1443 search results - page 81 / 289
» Aging Users are Still Users
Sort
View
IJWIN
2002
111views more  IJWIN 2002»
15 years 9 days ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
ICDM
2003
IEEE
142views Data Mining» more  ICDM 2003»
15 years 6 months ago
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
Collaborative Filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. E-commerce sites use CF systems to suggest products to customers base...
Huseyin Polat, Wenliang Du
106
Voted
USENIX
1994
15 years 1 months ago
A Better Update Policy
y-filled data block results in a delayed write,Abstract while a modification that fills a block results in an immediate, although asynchronous, write. TheSome file systems can dela...
Jeffrey C. Mogul
141
Voted
HRI
2009
ACM
14 years 10 months ago
Evaluating the ICRA 2008 HRI challenge
This paper reports on the evaluation of the ICRA 2008 Human-Robot Interaction (HRI) Challenge. Five research groups demonstrated state-of-the-art work on HRI with a special focus ...
Astrid Weiss, Thomas Scherndl, Manfred Tscheligi, ...
109
Voted
CCS
2006
ACM
15 years 4 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang