Sciweavers

897 search results - page 48 / 180
» Identity: How to name it, How to find it
Sort
View
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
15 years 8 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
134
Voted
CSCW
2000
ACM
15 years 6 months ago
Interaction and outeraction: instant messaging in action
We discuss findings from an ethnographic study of instant messaging (IM) in the workplace and its implications for media theory. We describe how instant messaging supports a varie...
Bonnie A. Nardi, Steve Whittaker, Erin Bradner
RSP
1999
IEEE
15 years 5 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
NIPS
2008
15 years 3 months ago
Differentiable Sparse Coding
Prior work has shown that features which appear to be biologically plausible as well as empirically useful can be found by sparse coding with a prior such as a laplacian (L1) that...
J. Andrew Bagnell, David M. Bradley
CN
2006
56views more  CN 2006»
15 years 1 months ago
Maximizing remote work in flooding-based peer-to-peer systems
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
Qixiang Sun, Neil Daswani, Hector Garcia-Molina