Sciweavers

7984 search results - page 1334 / 1597
» Exploring personal information
Sort
View
DIM
2009
ACM
15 years 8 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
IHM
2009
ACM
15 years 8 months ago
Wavelet menu: une adaptation des marking menus pour les dispositifs mobiles
Exploration and navigation in multimedia data hierarchies (e.g., photos, music) are frequent tasks on mobile devices. However, visualization and interaction are impoverished due t...
Jérémie Francone, Gilles Bailly, Lau...
CIKM
2009
Springer
15 years 8 months ago
Query processing of massive trajectory data based on mapreduce
With the development of positioning technologies and the boosting deployment of inexpensive location-aware sensors, large volumes of trajectory data have emerged. However, efficie...
Qiang Ma, Bin Yang 0002, Weining Qian, Aoying Zhou
CIKM
2009
Springer
15 years 8 months ago
RS-Wrapper: random write optimization for solid state drive
Solid State Drive (SSD), emerging as new data storage media with high random read speed, has been widely used in laptops, desktops, and data servers to replace hard disk during th...
Da Zhou, Xiaofeng Meng
HAIS
2009
Springer
15 years 8 months ago
Pareto-Based Multi-output Model Type Selection
In engineering design the use of approximation models (= surrogate models) has become standard practice for design space exploration, sensitivity analysis, visualization and optimi...
Dirk Gorissen, Ivo Couckuyt, Karel Crombecq, Tom D...
« Prev « First page 1334 / 1597 Last » Next »