Sciweavers

13791 search results - page 2483 / 2759
» Modeling Web Interactions
Sort
View
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
15 years 11 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
CC
2010
Springer
190views System Software» more  CC 2010»
15 years 11 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
154
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
159
Voted
ERSHOV
2009
Springer
15 years 11 months ago
Multi-level Virtual Machine Debugging Using the Java Platform Debugger Architecture
Abstract. Debugging virtual machines (VMs) presents unique challenges, especially meta-circular VMs, which are written in the same language they implement. Making sense of runtime ...
Thomas Würthinger, Michael L. Van De Vanter, ...
ESAW
2009
Springer
15 years 11 months ago
Normative Multi-Agent Organizations
Multi-agent systems are viewed as consisting of individual agents whose behaviors are regulated by organization artifacts. This abstract presents a programming language, which is d...
Mehdi Dastani
« Prev « First page 2483 / 2759 Last » Next »