Sciweavers

18898 search results - page 3716 / 3780
» The Making of a Software Engineer
Sort
View
CASES
2009
ACM
15 years 4 months ago
Towards scalable reliability frameworks for error prone CMPs
As technology scales and the energy of computation continually approaches thermal equilibrium [1,2], parameter variations and noise levels will lead to larger error rates at vario...
Joseph Sloan, Rakesh Kumar
MOBICOM
2009
ACM
15 years 4 months ago
SurroundSense: mobile phone localization via ambience fingerprinting
A growing number of mobile computing applications are centered around the user’s location. The notion of location is broad, ranging from physical coordinates (latitude/longitude...
Martin Azizyan, Ionut Constandache, Romit Roy Chou...
RECSYS
2009
ACM
15 years 4 months ago
Increasing engagement through early recommender intervention
Social network sites rely on the contributions of their members to create a lively and enjoyable space. Recent research has focused on using personalization and recommender techno...
Jill Freyne, Michal Jacovi, Ido Guy, Werner Geyer
SACMAT
2009
ACM
15 years 4 months ago
Dynamic mandatory access control for multiple stakeholders
In this paper, we present a mandatory access control system that uses input from multiple stakeholders to compose policies based on runtime information. In the emerging ubiquitous...
Vikhyath Rao, Trent Jaeger
SIGCOMM
2009
ACM
15 years 4 months ago
SMACK: a SMart ACKnowledgment scheme for broadcast messages in wireless networks
Network protocol designers, both at the physical and network level, have long considered interference and simultaneous transmission in wireless protocols as a problem to be avoide...
Aveek Dutta, Dola Saha, Dirk Grunwald, Douglas C. ...
« Prev « First page 3716 / 3780 Last » Next »