Sciweavers

395 search results - page 67 / 79
» Efficient Information Retrieval in Network Management Using ...
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Context and Location-Aware Encryption for Pervasive Computing Environments
Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the n...
Jalal Al-Muhtadi, Raquel L. Hill, Roy H. Campbell,...
AIRWEB
2009
Springer
14 years 3 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
GI
2005
Springer
14 years 2 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
OSDI
2004
ACM
14 years 9 months ago
Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control
This paper studies the use of statistical induction techniques as a basis for automated performance diagnosis and performance management. The goal of the work is to develop and ev...
Ira Cohen, Jeffrey S. Chase, Julie Symons, Mois&ea...
GVD
2009
162views Database» more  GVD 2009»
13 years 7 months ago
Archiving and Maintaining Curated Databases
Curated databases represent a substantial amount of effort by a dedicated group of people to produce a definitive description of some subject area. The value of curated databases ...
Heiko Müller