Sciweavers

301 search results - page 46 / 61
» Associative information access using DualNAVI
Sort
View
IUI
2005
ACM
14 years 29 days ago
TaskTracer: a desktop environment to support multi-tasking knowledge workers
This paper reports on TaskTracer — a software system being designed to help highly multitasking knowledge workers rapidly locate, discover, and reuse past processes they used to...
Anton N. Dragunov, Thomas G. Dietterich, Kevin Joh...
PCI
2005
Springer
14 years 27 days ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...
ICADL
2004
Springer
161views Education» more  ICADL 2004»
14 years 24 days ago
An Implementation of Web Image Search Engines
This paper presents our implementation techniques for an intelligent Web image search engine. A reference architecture of the system is provided and addressed in this paper. The s...
Zhiguo Gong, Leong Hou U, Chan Wa Cheang
DRM
2003
Springer
14 years 19 days ago
Digital rights management in a 3G mobile phone and beyond
In this paper we examine how copyright protection of digital items can be securely managed in a 3G mobile phone and other devices. First, the basic concepts, strategies, and requi...
Thomas S. Messerges, Ezzat A. Dabbish
CCS
2006
ACM
13 years 11 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang