Sciweavers

7422 search results - page 1385 / 1485
» Ethnomethodologically informed ethnography and information s...
Sort
View
ICAC
2009
IEEE
15 years 8 months ago
Resilient workload manager: taming bursty workload of scaling internet applications
In data centers hosting scaling Internet applications, operators face the tradeoff dilemma between resource efficiency and Quality of Service (QoS), and the root cause lies in wo...
Hui Zhang 0002, Guofei Jiang, Kenji Yoshihira, Hai...
ICRA
2009
IEEE
106views Robotics» more  ICRA 2009»
15 years 8 months ago
Simultaneous local and global state estimation for robotic navigation
— Recent applications of robotics often demand two types of spatial awareness: 1) A fine-grained description of the robot’s immediate surroundings for obstacle avoidance and p...
David C. Moore, Albert S. Huang, Matthew Walter, E...
IPPS
2007
IEEE
15 years 8 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
ASSETS
2006
ACM
15 years 7 months ago
Interactive tracking of movable objects for the blind on the basis of environment models and perception-oriented object recognit
In previous work we have presented a prototype of an assistant system for the blind that can be used for self-localization and interactive object identification of static objects ...
Andreas Hub, Tim Hartter, Thomas Ertl
SOUPS
2006
ACM
15 years 7 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
« Prev « First page 1385 / 1485 Last » Next »