Sciweavers

501 search results - page 48 / 101
» A Social Action Model of Situated Information Systems Design
Sort
View
ICSM
2009
IEEE
14 years 3 months ago
Visualizing the Java heap demonstration proposal
Many of the problems that occur in long-running systems involve the way that the system uses memory. We have developed a framework for extracting and building a model of the heap ...
Steven P. Reiss
WWW
2008
ACM
14 years 9 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
SIGMETRICS
2008
ACM
124views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Class-of-service in ip backbones: informing the network neutrality debate
The benefit of Class-of-Service (CoS) is an important topic in the "Network Neutrality" debate. Proponents of network neutrality suggest that over-provisioning is a viab...
Murat Yuksel, Kadangode K. Ramakrishnan, Shivkumar...
SIGIR
2009
ACM
14 years 3 months ago
Predicting user interests from contextual information
Search and recommendation systems must include contextual information to effectively model users’ interests. In this paper, we present a systematic study of the effectiveness of...
Ryen W. White, Peter Bailey, Liwei Chen
ISVC
2007
Springer
14 years 2 months ago
A Vision-Based Architecture for Intent Recognition
Abstract. Understanding intent is an important aspect of communication among people and is an essential component of the human cognitive system. This capability is particularly rel...
Alireza Tavakkoli, Richard Kelley, Christopher Kin...