Sciweavers

8468 search results - page 1444 / 1694
» The Technology of Data Stashing
Sort
View
86
Voted
ACMSE
2009
ACM
15 years 3 months ago
Towards policy driven self-configuration of user-centric communication
The convergence of various multimedia communications that includes voice, video and data presents many opportunities for enabling unified communication but paradoxically leads to ...
Paola Boettner, Mansi Gupta, Yali Wu, Andrew A. Al...
ATAL
2007
Springer
15 years 3 months ago
On the benefits of cheating by self-interested agents in vehicular networks
As more and more cars are equipped with GPS and Wi-Fi transmitters, it becomes easier to design systems that will allow cars to interact autonomously with each other, e.g., regard...
Raz Lin, Sarit Kraus, Yuval Shavitt
C3S2E
2009
ACM
15 years 3 months ago
The promise of solid state disks: increasing efficiency and reducing cost of DBMS processing
Most database systems (DBMSs) today are operating on servers equipped with magnetic disks. In our contribution, we want to motivate the use of two emerging and striking technologi...
Karsten Schmidt 0002, Yi Ou, Theo Härder
CHIMIT
2007
ACM
15 years 3 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
CIKM
2009
Springer
15 years 3 months ago
Empirical justification of the gain and discount function for nDCG
The nDCG measure has proven to be a popular measure of retrieval effectiveness utilizing graded relevance judgments. However, a number of different instantiations of nDCG exist, d...
Evangelos Kanoulas, Javed A. Aslam
« Prev « First page 1444 / 1694 Last » Next »