Sciweavers

1917 search results - page 226 / 384
» User Model and Utility Based Power Management
Sort
View
MHCI
2009
Springer
15 years 11 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
WSC
2007
15 years 6 months ago
High-performance computing enables simulations to transform education
This paper presents the case that education in the 21st Century can only measure up to national needs if technologies developed in the simulation community, further enhanced by th...
Dan M. Davis, Thomas D. Gottschalk, Laurel K. Davi...
JIT
2005
Springer
149views Database» more  JIT 2005»
15 years 10 months ago
Grid Resource Ontologies and Asymmetric Resource-Correlation
Automatic Grid resource discovery and brokerage shields the Grid middleware complexities from the Grid users and leads towards an invisible but simple and robust Grid. Realizing th...
Mumtaz Siddiqui, Thomas Fahringer, Jürgen Hof...
WSC
1998
15 years 5 months ago
Simulation with GPSS/H
GPSS/H is a well-known, traditional simulation tool whose user base continues to grow despite the presence of many "new" trends in simulation technology. In GPSS/H, the ...
Robert C. Crain
WSDM
2010
ACM
322views Data Mining» more  WSDM 2010»
16 years 1 months ago
Inferring Search Behaviors Using Partially Observable Markov (POM) Model
This article describes an application of the partially observable Markov (POM) model to the analysis of a large scale commercial web search log. Mathematically, POM is a variant o...
Kuansan Wang, Nikolas Gloy, Xiaolong Li