Sciweavers

2177 search results - page 411 / 436
» Designing Behaviors for Information Agents
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Secure and practical outsourcing of linear programming in cloud computing
—Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsourc...
Cong Wang, Kui Ren, Jia Wang
CHI
2008
ACM
14 years 8 months ago
The network in the garden: an empirical analysis of social media in rural life
History repeatedly demonstrates that rural communities have unique technological needs. Yet, we know little about how rural communities use modern technologies, so we lack knowled...
Eric Gilbert, Karrie Karahalios, Christian Sandvig
CHI
2006
ACM
14 years 8 months ago
Providing support for adaptive scripting in an on-line collaborative learning environment
This paper describes results from a series of experimental studies to explore issues related to structuring productive group dynamics for collaborative learning using an adaptive ...
Carolyn Penstein Rosé, Gahgene Gweon, Regan...
SIGCOMM
2009
ACM
14 years 2 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
MHCI
2007
Springer
14 years 1 months ago
Understanding human-battery interaction on mobile phones
Mobile phone users have to deal with limited battery lifetime through a reciprocal process we call human-battery interaction (HBI). We conducted three user studies in order to und...
Ahmad Rahmati, Angela Qian, Lin Zhong