Sciweavers

448 search results - page 71 / 90
» Personal Workflow Management in Support of Pervasive Computi...
Sort
View
CHI
2005
ACM
15 years 10 months ago
No task left behind?: examining the nature of fragmented work
We present data from detailed observation of 24 information workers that shows that they experience work fragmentation as common practice. We consider that work fragmentation has ...
Gloria Mark, Justin Harris, Víctor M. Gonz&...
ACSC
2009
IEEE
15 years 5 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
93
Voted
DEBS
2009
ACM
15 years 1 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
STORAGESS
2005
ACM
15 years 3 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
SIGCSE
2010
ACM
186views Education» more  SIGCSE 2010»
15 years 4 months ago
Teaching operating systems using virtual appliances and distributed version control
Students learn more through hands-on project experience for computer science courses such as operating systems, but providing the infrastructure support for a large class to learn...
Oren Laadan, Jason Nieh, Nicolas Viennot