Sciweavers

11573 search results - page 2160 / 2315
» Designing Relational Databases
Sort
View
145
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
Describing and forecasting video access patterns
Abstract—Computer systems are increasingly driven by workloads that reflect large-scale social behavior, such as rapid changes in the popularity of media items like videos. Capa...
Gonca Gürsun, Mark Crovella, Ibrahim Matta
CHI
2011
ACM
14 years 7 months ago
Enhancing independence and safety for blind and deaf-blind public transit riders
Blind and deaf-blind people often rely on public transit for everyday mobility, but using transit can be challenging for them. We conducted semi-structured interviews with 13 blin...
Shiri Azenkot, Sanjana Prasain, Alan Borning, Emil...
158
Voted
ASIACRYPT
2011
Springer
14 years 3 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
143
Voted
ASUNAM
2011
IEEE
14 years 3 months ago
Evolutionary Clustering and Analysis of Bibliographic Networks
—In this paper, we study the problem of evolutionary clustering of multi-typed objects in a heterogeneous bibliographic network. The traditional methods of homogeneous clustering...
Manish Gupta, Charu C. Aggarwal, Jiawei Han, Yizho...
109
Voted
CASE
2011
70views more  CASE 2011»
14 years 3 months ago
Automation of assembly and packaging at the micro/nano-scale
— This paper provides a general overview of the material covered in the fullday workshop with the same title devoted to the field of automation in microassembly and packaging at...
Micky Rakotondrabe, Yassine Haddab, Cédric ...
« Prev « First page 2160 / 2315 Last » Next »