Sciweavers

2913 search results - page 362 / 583
» How Much to Copy
Sort
View
118
Voted
CHI
2003
ACM
16 years 4 months ago
The challenges of user-centered design and evaluation for infrastructure
Infrastructure software comprises code libraries or runtime processes that support the development or operation of application software. A particular infrastructure system may sup...
W. Keith Edwards, Victoria Bellotti, Anind K. Dey,...
108
Voted
RECOMB
2006
Springer
16 years 3 months ago
Markov Additive Chains and Applications to Fragment Statistics for Peptide Mass Fingerprinting
Abstract. Peptide mass fingerprinting is a technique to identify a protein from its fragment masses obtained by mass spectrometry after enzymatic digestion. Recently, much attentio...
Hans-Michael Kaltenbach, Sebastian Böcker, Sv...
135
Voted
STOC
2007
ACM
84views Algorithms» more  STOC 2007»
16 years 3 months ago
Lower bounds in communication complexity based on factorization norms
We introduce a new method to derive lower bounds on randomized and quantum communication complexity. Our method is based on factorization norms, a notion from Banach Space theory....
Nati Linial, Adi Shraibman
221
Voted
VLDB
2008
ACM
141views Database» more  VLDB 2008»
16 years 3 months ago
Deploying and managing Web services: issues, solutions, and directions
Web services are expected to be the key technology in enabling the next installment of the Web in the form of the Service Web. In this paradigm shift, Web services would be treated...
Qi Yu, Xumin Liu, Athman Bouguettaya, Brahim Medja...
123
Voted
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
16 years 3 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer