Sciweavers

5064 search results - page 958 / 1013
» Web Information Management System: Personalization and Gener...
Sort
View
MOBIHOC
2007
ACM
15 years 9 months ago
Outlier detection in sensor networks
Outlier detection has many important applications in sensor networks, e.g., abnormal event detection, animal behavior change, etc. It is a difficult problem since global informati...
Bo Sheng, Qun Li, Weizhen Mao, Wen Jin
CHI
2010
ACM
15 years 4 months ago
Video playdate: toward free play across distance
We present an empirical investigation of video-mediated free play between 13 pairs of friends (ages 7 and 8). The pairs spent 10 minutes playing with each of four different protot...
Svetlana Yarosh, Kori M. Inkpen, A. J. Bernheim Br...
CCS
2010
ACM
15 years 4 months ago
Bureaucratic protocols for secure two-party sorting, selection, and permuting
In this paper, we introduce a framework for secure two-party (S2P) computations, which we call bureaucratic computing, and we demonstrate its efficiency by designing practical S2P...
Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenlia...
PLDI
2009
ACM
15 years 4 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer
CIKM
2009
Springer
15 years 4 months ago
Group-by skyline query processing in relational engines
The skyline operator was first proposed in 2001 for retrieving interesting tuples from a dataset. Since then, 100+ skyline-related papers have been published; however, we discove...
Ming-Hay Luk, Man Lung Yiu, Eric Lo