Sciweavers

7747 search results - page 1527 / 1550
» From Information Retrieval to Information Interaction
Sort
View
SIGCOMM
2009
ACM
14 years 1 months ago
Detailed diagnosis in enterprise networks
By studying trouble tickets from small enterprise networks, we conclude that their operators need detailed fault diagnosis. That is, the diagnostic system should be able to diagno...
Srikanth Kandula, Ratul Mahajan, Patrick Verkaik, ...
SIGCOMM
2009
ACM
14 years 1 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
SOUPS
2009
ACM
14 years 1 months ago
A user study of the expandable grid applied to P3P privacy policy visualization
Displaying website privacy policies to consumers in ways they understand is an important part of gaining consumers’ trust and informed consent, yet most website privacy policies...
Robert W. Reeder, Patrick Gage Kelley, Aleecia M. ...
FGR
2008
IEEE
227views Biometrics» more  FGR 2008»
14 years 1 months ago
Ambient intelligence as the bridge to the future of pervasive computing
One prediction about this future of pervasive technology is that people will carry the tools needed to interface with technological resources sprinkled through out the environment...
Christopher Richard Wren, Yuri A. Ivanov
ICASSP
2008
IEEE
14 years 1 months ago
Joint tracking and video registration by factorial Hidden Markov models
Tracking moving objects from image sequences obtained by a moving camera is a difficult problem since there exists apparent motion of the static background. It becomes more dif...
Xue Mei, Fatih Murat Porikli
« Prev « First page 1527 / 1550 Last » Next »