Sciweavers

561 search results - page 51 / 113
» How to operate a PC without using the hands
Sort
View
MOBILITY
2009
ACM
15 years 6 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
KDD
2007
ACM
181views Data Mining» more  KDD 2007»
16 years 1 months ago
BoostCluster: boosting clustering by pairwise constraints
Data clustering is an important task in many disciplines. A large number of studies have attempted to improve clustering by using the side information that is often encoded as pai...
Yi Liu, Rong Jin, Anil K. Jain
IMC
2009
ACM
15 years 8 months ago
Triangle inequality variations in the internet
Triangle inequality violations (TIVs) are important for latency sensitive distributed applications. On one hand, they can expose opportunities to improve network routing by findi...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
BMCBI
2006
205views more  BMCBI 2006»
15 years 1 months ago
Application of Petri net based analysis techniques to signal transduction pathways
Background: Signal transduction pathways are usually modelled using classical quantitative methods, which are based on ordinary differential equations (ODEs). However, some diffic...
Andrea Sackmann, Monika Heiner, Ina Koch
OSDI
2002
ACM
16 years 1 months ago
Vertigo: Automatic Performance-Setting for Linux
Combining high performance with low power consumption is becoming one of the primary objectives of processor designs. Instead of relying just on sleep mode for conserving power, a...
Krisztián Flautner, Trevor N. Mudge