Sciweavers

8468 search results - page 1513 / 1694
» The Technology of Data Stashing
Sort
View
WWW
2010
ACM
15 years 5 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
WWW
2010
ACM
15 years 5 months ago
Measurement and analysis of an online content voting network: a case study of Digg
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
Yingwu Zhu
WWW
2009
ACM
15 years 5 months ago
A game based approach to assign geographical relevance to web images
Geographical context is very important for images. Millions of images on the Web have been already assigned latitude and longitude information. Due to the rapid proliferation of s...
Yuki Arase, Xing Xie, Manni Duan, Takahiro Hara, S...
ICIW
2009
IEEE
15 years 5 months ago
An Adaptive Scheduling Policy for Staged Applications
The performance of Web servers and application servers is a crucial factor for the success of the underlying business activity. Current commercial servers (such as Apache and Micr...
Mohammad Shadi Al Hakeem, Jan Richling, Gero M&uum...
ISCA
2009
IEEE
152views Hardware» more  ISCA 2009»
15 years 5 months ago
Scaling the bandwidth wall: challenges in and avenues for CMP scaling
As transistor density continues to grow at an exponential rate in accordance to Moore’s law, the goal for many Chip Multi-Processor (CMP) systems is to scale the number of on-ch...
Brian M. Rogers, Anil Krishna, Gordon B. Bell, Ken...
« Prev « First page 1513 / 1694 Last » Next »