Sciweavers

1384 search results - page 247 / 277
» Protocol Models of Human-Computer Interaction
Sort
View
CONCURRENCY
2002
230views more  CONCURRENCY 2002»
14 years 9 months ago
Economic models for resource management and scheduling in Grid computing
: The accelerated development in Peer-to-Peer (P2P) and Grid computing has positioned them as promising next generation computing platforms. They enable the creation of Virtual Ent...
Rajkumar Buyya, David Abramson, Jonathan Giddy, He...
DGO
2009
175views Education» more  DGO 2009»
14 years 11 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
ECIR
1998
Springer
14 years 11 months ago
Evaluation of Interfaces for IRS: Modelling End-User Searching Behaviour
This paper describes an investigation in progress into the searching behaviour of end-users and how it is affected by interface design. The project focused on qualitative data gat...
Victoria Manglano, Micheline Beaulieu, Stephen E. ...
SIGCOMM
2012
ACM
13 years 8 days ago
AutoNetkit: simplifying large scale, open-source network experimentation
We present a methodology that brings simplicity to large and comt labs by using abstraction. The networking community has appreciated the value of large scale test labs to explore...
Simon Knight, Askar Jaboldinov, Olaf Maennel, Iain...
CSFW
2003
IEEE
15 years 3 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows