Sciweavers

4445 search results - page 831 / 889
» Reflective Authorization Systems
Sort
View
EDBT
2011
ACM
199views Database» more  EDBT 2011»
14 years 1 months ago
Predicting completion times of batch query workloads using interaction-aware models and simulation
A question that database administrators (DBAs) routinely need to answer is how long a batch query workload will take to complete. This question arises, for example, while planning...
Mumtaz Ahmad, Songyun Duan, Ashraf Aboulnaga, Shiv...
CSCW
2012
ACM
13 years 5 months ago
Shepherding the crowd yields better work
Micro-task platforms provide massively parallel, ondemand labor. However, it can be difficult to reliably achieve high-quality work because online workers may behave irresponsibly...
Steven Dow, Anand Pramod Kulkarni, Scott R. Klemme...
IUI
2012
ACM
13 years 5 months ago
Effective browsing and serendipitous discovery with an experience-infused browser
In the digital age, users can have perfect recall of their digital experiences. In this paper, we explore how this recall can be leveraged during web browsing. We have built a sys...
Sudheendra Hangal, Abhinay Nagpal, Monica S. Lam
TEI
2012
ACM
331views Hardware» more  TEI 2012»
13 years 5 months ago
Body-centric interaction with mobile devices
Most current mobile technologies require on-screen operations for interacting with devices’ visual contents. However, as a trade-off for mobility, screens usually provide limite...
Xiang 'Anthony' Chen
SIGUCCS
2003
ACM
15 years 3 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah