Sciweavers

1466 search results - page 178 / 294
» Evaluation Issues in Autonomic Computing
Sort
View
CHI
2011
ACM
14 years 1 months ago
The effects of task dimensionality, endpoint deviation, throughput calculation, and experiment design on pointing measures and m
Fitts’ law (1954) characterizes pointing speed-accuracy performance as throughput, whose invariance to target distances (A) and sizes (W) is known. However, it is unknown whethe...
Jacob O. Wobbrock, Kristen Shinohara, Alex Jansen
ACISICIS
2009
IEEE
15 years 4 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
CCS
2009
ACM
15 years 4 months ago
Inferring privacy policies for social networking services
Social networking sites have come under criticism for their poor privacy protection track record. Yet, there is an inherent difficulty in deciding which principals should have acc...
George Danezis
SEUS
2009
IEEE
15 years 4 months ago
Towards Time-Predictable Data Caches for Chip-Multiprocessors
Future embedded systems are expected to use chip-multiprocessors to provide the execution power for increasingly demanding applications. Multiprocessors increase the pressure on th...
Martin Schoeberl, Wolfgang Puffitsch, Benedikt Hub...
INFOCOM
2008
IEEE
15 years 4 months ago
Lightweight and Compromise-Resilient Message Authentication in Sensor Networks
Abstract—Numerous authentication schemes have been proposed in the past for protecting communication authenticity and integrity in wireless sensor networks. Most of them however ...
Wensheng Zhang, Nalin Subramanian, Guiling Wang