Sciweavers

2061 search results - page 260 / 413
» Authorization for Metacomputing Applications
Sort
View
CHI
2002
ACM
16 years 4 months ago
Investigating human-computer optimization
Scheduling, routing, and layout tasks are examples of hardamount of computational effort expended on different subproblems. CHI?2002 This work may not be copied or reproduced in w...
Stacey D. Scott, Neal Lesh, Gunnar W. Klau
SIGMOD
2003
ACM
141views Database» more  SIGMOD 2003»
16 years 4 months ago
QC-Trees: An Efficient Summary Structure for Semantic OLAP
Recently, a technique called quotient cube was proposed as a summary structure for a data cube that preserves its semantics, with applications for online exploration and visualiza...
Laks V. S. Lakshmanan, Jian Pei, Yan Zhao
ICSE
2005
IEEE-ACM
16 years 4 months ago
An empirical study of fault localization for end-user programmers
End users develop more software than any other group of programmers, using software authoring devices such as e-mail filtering editors, by-demonstration macro builders, and spread...
Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rot...
PERCOM
2006
ACM
16 years 4 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
CSCW
2010
ACM
16 years 1 months ago
Notifications and awareness: a field study of alert usage and preferences
Desktop notifications are designed to provide awareness of information while a user is attending to a primary task. Unfortunately the awareness can come with the price of disrupti...
Shamsi T. Iqbal, Eric Horvitz