Sciweavers

1478 search results - page 147 / 296
» Modeling user activities in a large IPTV system
Sort
View
107
Voted
ICCD
2008
IEEE
117views Hardware» more  ICCD 2008»
15 years 10 months ago
RMA: A Read Miss-Based Spin-Down Algorithm using an NV cache
—It is an important issue to reduce the power consumption of a hard disk that takes a large amount of computer system’s power. As a new trend, an NV cache is used to make a dis...
Hyotaek Shim, Jaegeuk Kim, Dawoon Jung, Jin-Soo Ki...
DAGSTUHL
2007
15 years 3 months ago
Ubiquitous Nature of Event-Driven Approaches: A Retrospective View
This paper retrospectively analyzes the progress of event-based capability and their applicability in various domains. Although research on event-based approaches started in a hum...
Sharma Chakravarthy, Raman Adaikkalavan
109
Voted
CHI
2010
ACM
15 years 8 months ago
SensorTune: a mobile auditory interface for DIY wireless sensor networks
Wireless Sensor Networks (WSNs) allow the monitoring of activity or environmental conditions over a large area, from homes to industrial plants, from agriculture fields to forest...
Enrico Costanza, Jacques Panchard, Guillaume Zuffe...
SIGIR
2010
ACM
15 years 5 months ago
Ready to buy or just browsing?: detecting web searcher goals from interaction data
An improved understanding of the relationship between search intent, result quality, and searcher behavior is crucial for improving the effectiveness of web search. While recent p...
Qi Guo, Eugene Agichtein
CCS
2010
ACM
15 years 2 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov