Sciweavers

274 search results - page 49 / 55
» Security user studies: methodologies and best practices
Sort
View
SIGMOD
2006
ACM
117views Database» more  SIGMOD 2006»
15 years 9 months ago
Database support for matching: limitations and opportunities
We define a match join of R and S with predicate to be a subset of the -join of R and S such that each tuple of R and S contributes to at most one result tuple. Match joins and t...
Ameet Kini, Srinath Shankar, Jeffrey F. Naughton, ...
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
15 years 11 months ago
Standing Out in a Crowd: Selecting Attributes for Maximum Visibility
In recent years, there has been significant interest in development of ranking functions and efficient top-k retrieval algorithms to help users in ad-hoc search and retrieval in da...
Muhammed Miah, Gautam Das, Vagelis Hristidis, Heik...
INFSOF
2006
72views more  INFSOF 2006»
14 years 9 months ago
Partial rollback in object-oriented/object-relational database management systems with dual buffer
Partial rollback mechanism has been widely supported by many database management systems (DBMSs). It allows a transaction to be rolled back partially, that is, only back to a cert...
Won-Young Kim, Byung Suk Lee, Kyu-Young Whang
HCI
2009
14 years 7 months ago
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...
Takayuki Nozawa, Toshiyuki Kondo
CHI
2011
ACM
14 years 1 months ago
User-defined motion gestures for mobile interaction
Modern smartphones contain sophisticated sensors to monitor three-dimensional movement of the device. These sensors permit devices to recognize motion gestures— deliberate movem...
Jaime Ruiz, Yang Li, Edward Lank