Sciweavers

1636 search results - page 107 / 328
» From Usability Lab to
Sort
View
116
Voted
CLUSTER
2002
IEEE
15 years 8 months ago
Leveraging Standard Core Technologies to Programmatically Build Linux Cluster Appliances
Clusters have made the jump from lab prototypes to fullfledged production computing platforms. The number, variety, and specialized configurations of these machines are increasi...
Mason J. Katz, Philip M. Papadopoulos, Greg Bruno
NSDI
2004
15 years 4 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
WISEC
2010
ACM
15 years 3 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
128
Voted
BMCBI
2008
188views more  BMCBI 2008»
15 years 3 months ago
anNET: a tool for network-embedded thermodynamic analysis of quantitative metabolome data
Background: Compared to other omics techniques, quantitative metabolomics is still at its infancy. Complex sample preparation and analytical procedures render exact quantification...
Nicola Zamboni, Anne Kümmel, Matthias Heinema...
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
13 years 5 months ago
Harnessing the wisdom of the crowds for accurate web page clipping
Clipping Web pages, namely extracting the informative clips (areas) from Web pages, has many applications, such as Web printing and e-reading on small handheld devices. Although m...
Lei Zhang, Linpeng Tang, Ping Luo, Enhong Chen, Li...