Sciweavers

8468 search results - page 1389 / 1694
» The Technology of Data Stashing
Sort
View
INTERSENSE
2006
ACM
15 years 5 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...
PADS
2006
ACM
15 years 5 months ago
SOAr-DSGrid: Service-Oriented Architecture for Distributed Simulation on the Grid
Simulation is a low cost alternative to experimentation on real-world physical systems. Grid technology enables coordinated use of and secure access to distributed computing resou...
Xinjun Chen, Wentong Cai, Stephen John Turner, Yon...
SAC
2006
ACM
15 years 5 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
SIGIR
2006
ACM
15 years 5 months ago
Improving web search ranking by incorporating user behavior information
We show that incorporating user behavior data can significantly improve ordering of top results in real web search setting. We examine alternatives for incorporating feedback into...
Eugene Agichtein, Eric Brill, Susan T. Dumais
SIGIR
2006
ACM
15 years 5 months ago
User modeling for full-text federated search in peer-to-peer networks
User modeling for information retrieval has mostly been studied to improve the effectiveness of information access in centralized repositories. In this paper we explore user model...
Jie Lu, James P. Callan
« Prev « First page 1389 / 1694 Last » Next »