Sciweavers

1818 search results - page 262 / 364
» How users use access control
Sort
View
BTW
2009
Springer
114views Database» more  BTW 2009»
15 years 10 months ago
Value Demonstration of Embedded Analytics for Front Office Applications
: Users of front office applications such as call center or customer support applications make millions and millions of decisions each day without analytical support. For example, ...
Erik Nijkamp, Martin Oberhofer, Albert Maier
WWW
2005
ACM
16 years 4 months ago
User-centric Web crawling
Search engines are the primary gateways of information access on the Web today. Behind the scenes, search engines crawl the Web to populate a local indexed repository of Web pages...
Sandeep Pandey, Christopher Olston
SIGMETRICS
1999
ACM
15 years 8 months ago
Availability and Utility of Idle Memory in Workstation Clusters
In this paper, we examine the availability and utility of idle memory in workstation clusters. We attempt to answer the following questions. First, how much of the total memory in...
Anurag Acharya, Sanjeev Setia
IPPS
2007
IEEE
15 years 10 months ago
A Semi-Distributed Axiomatic Game Theoretical Mechanism for Replicating Data Objects in Large Distributed Computing Systems
Replicating data objects onto servers across a system can alleviate access delays. The selection of data objects and servers requires solving a constraint optimization problem, wh...
Samee Ullah Khan, Ishfaq Ahmad
IWCMC
2006
ACM
15 years 10 months ago
Performance evaluation of joint downlink scheduling in multi-cellular OFDMA systems based on IEEE 802.16a
The employment of the OFDMA transmission technique in broadband radio systems shows several benefits. Especially the exploitation of multi-user diversity with the help of sophisti...
Michael Einhaus, Ole Klein, Bernhard Walke, Daniel...