Sciweavers

1631 search results - page 284 / 327
» Extreme Programming - Back to Basics
Sort
View
WWW
2008
ACM
14 years 10 months ago
Characterizing typical and atypical user sessions in clickstreams
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and...
Narayanan Sadagopan, Jie Li
CHI
2009
ACM
14 years 10 months ago
Providing dynamically changeable physical buttons on a visual display
Physical buttons have the unique ability to provide lowattention and vision-free interactions through their intuitive tactile clues. Unfortunately, the physicality of these interf...
Chris Harrison, Scott E. Hudson
MOBIHOC
2009
ACM
14 years 10 months ago
Energy-efficient capture of stochastic events by global- and local-periodic network coverage
We consider a high density of sensors randomly placed in a geographical area for event monitoring. The monitoring regions of the sensors may have significant overlap, and a subset...
Shibo He, Jiming Chen, David K. Y. Yau, Huanyu Sha...
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
14 years 10 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
EUROSYS
2010
ACM
14 years 7 months ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie