Sciweavers

4529 search results - page 858 / 906
» Position Based Cryptography
Sort
View
KDD
2010
ACM
190views Data Mining» more  KDD 2010»
15 years 6 months ago
User browsing models: relevance versus examination
There has been considerable work on user browsing models for search engine results, both organic and sponsored. The click-through rate (CTR) of a result is the product of the prob...
Ramakrishnan Srikant, Sugato Basu, Ni Wang, Daryl ...
DSD
2009
IEEE
136views Hardware» more  DSD 2009»
15 years 6 months ago
An Evaluation of Behaviors of S-NUCA CMPs Running Scientific Workload
Modern systems are able to put two or more processors on the same die (Chip Multiprocessors, CMP), each with its private caches, while the last level caches can be either private ...
Pierfrancesco Foglia, Francesco Panicucci, Cosimo ...
ICAIL
2007
ACM
15 years 6 months ago
The Ontology of Legal Possibilities and Legal Potentialities
Ontologies in a legal expert system must be processed to suit all possible user cases within the field of law of the system. From the logical premises of a deductive system of expr...
Pamela N. Gray
COMPSAC
2004
IEEE
15 years 6 months ago
Towards Autonomic Computing Middleware via Reflection
ion Abstracts Zizhan Zheng, Qianxiang Wang, Gang Huang and Hong Mei. Design and Implementation of the Load Balancing Mechanism in PKUAS (in Chinese). ACTA ELECTRONICA SINICA, 32(12...
Gang Huang, Tiancheng Liu, Hong Mei, Zizhan Zheng,...
CSCW
2004
ACM
15 years 6 months ago
Putting systems into place: a qualitative study of design requirements for location-aware community systems
We present a conceptual framework for location-aware community systems and results from two studies of how sociallydefined places influence people's information sharing and c...
Quentin Jones, Sukeshini A. Grandhi, Steve Whittak...