Sciweavers

424 search results - page 52 / 85
» Balanced Incomplete Factorization
Sort
View
CHI
2005
ACM
16 years 2 months ago
Who gets to know what when: configuring privacy permissions in an awareness application
We report on a study (N=36) of user preferences for balancing awareness with privacy. Participants defined permissions for sharing of location, availability, calendar information ...
Sameer Patil, Jennifer Lai
CHI
2010
ACM
15 years 8 months ago
Signed networks in social media
Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on soci...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...
IPPS
2007
IEEE
15 years 8 months ago
Achieving Reliable Parallel Performance in a VoD Storage Server Using Randomization and Replication
This paper investigates randomization and replication as strategies to achieve reliable performance in disk arrays targeted for video-on-demand (VoD) workloads. A disk array can p...
Yung Ryn Choe, Vijay S. Pai
MM
2006
ACM
157views Multimedia» more  MM 2006»
15 years 8 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
SIGMETRICS
2010
ACM
212views Hardware» more  SIGMETRICS 2010»
15 years 6 months ago
A mean field model of work stealing in large-scale systems
In this paper, we consider a generic model of computational grids, seen as several clusters of homogeneous processors. In such systems, a key issue when designing efficient job al...
Nicolas Gast, Bruno Gaujal