Sciweavers

1478 search results - page 91 / 296
» Modeling user activities in a large IPTV system
Sort
View
MHCI
2009
Springer
15 years 4 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
ICRA
2010
IEEE
137views Robotics» more  ICRA 2010»
14 years 8 months ago
Robot reinforcement learning using EEG-based reward signals
Abstract— Reinforcement learning algorithms have been successfully applied in robotics to learn how to solve tasks based on reward signals obtained during task execution. These r...
Iñaki Iturrate, Luis Montesano, Javier Ming...
CCGRID
2010
IEEE
14 years 10 months ago
Discovering Piecewise Linear Models of Grid Workload
—Despite extensive research focused on enabling QoS for grid users through economic and intelligent resource provisioning, no consensus has emerged on the most promising strategi...
Tamás Éltetö, Cécile Ger...
ICSOC
2009
Springer
14 years 7 months ago
Fine-Grained Recommendation Systems for Service Attribute Exchange
Abstract. The effectiveness of service oriented computing relies on the trustworthiness of sharing of data between services. We advocate a semi-automated approach for information d...
Christopher Staite, Rami Bahsoon, Stephen Wolak
SIGMETRICS
2010
ACM
146views Hardware» more  SIGMETRICS 2010»
14 years 4 months ago
In-degree dynamics of large-scale P2P systems
This paper builds a complete modeling framework for understanding user churn and in-degree dynamics in unstructured P2P systems in which each user can be viewed as a stationary al...
Zhongmei Yao, Daren B. H. Cline, Dmitri Loguinov