Sciweavers

8655 search results - page 314 / 1731
» Challenges for Trusted Computing
Sort
View
128
Voted
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 2 months ago
Service Level Agreement (SLA) in Utility Computing Systems
In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee th...
Linlin Wu, Rajkumar Buyya
126
Voted
UIST
2010
ACM
15 years 1 months ago
TurKit: human computation algorithms on mechanical turk
Mechanical Turk provides an on-demand source of human computation. This provides a tremendous opportunity to explore algorithms which incorporate human computation as a function c...
Greg Little, Lydia B. Chilton, Max Goldman, Robert...
CHI
2007
ACM
16 years 3 months ago
Enhancing ubiquitous computing with user interpretation: field testing the home health horoscope
Domestic ubiquitous computing systems often rely on inferences about activities in the home, but the open-ended, dynamic and heterogeneous nature of the home poses serious problem...
William W. Gaver, Phoebe Sengers, Tobie Kerridge, ...
CHI
2003
ACM
16 years 3 months ago
Media inequality in conversation: how people behave differently when interacting with computers and people
How is interacting with computer programs different from interacting with people? One answer in the literature is that these two types of interactions are similar. The present stu...
Nicole Shechtman, Leonard M. Horowitz
ICAC
2009
IEEE
15 years 10 months ago
Applying genetic algorithms to decision making in autonomic computing systems
Increasingly, applications need to be able to self-reconfigure in response to changing requirements and environmental conditions. Autonomic computing has been proposed as a means...
Andres J. Ramirez, David B. Knoester, Betty H. C. ...