Sciweavers

1818 search results - page 169 / 364
» How users use access control
Sort
View
RECSYS
2010
ACM
13 years 10 months ago
Eye-tracking product recommenders' usage
Recommender systems have emerged as an effective decision tool to help users more easily and quickly find products that they prefer, especially in e-commerce environments. However...
Sylvain Castagnos, Nicolas Jones, Pearl Pu
NOMS
2000
IEEE
125views Communications» more  NOMS 2000»
14 years 2 months ago
A distributed resource controller for QoS applications
The Distributed Resource Controller (DRC) technology described in this paper provides a novel approach to interfacing applications with emerging network mechanisms to deliver Qual...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
SASO
2007
IEEE
14 years 4 months ago
Leveraging Resource Prediction for Anticipatory Dynamic Configuration
Self-adapting systems based on multiple concurrent applications must decide how to allocate scarce resources to applications and how to set the quality parameters of each applicat...
Vahe Poladian, David Garlan, Mary Shaw, M. Satyana...
ADC
2009
Springer
163views Database» more  ADC 2009»
14 years 4 months ago
ActiveTags: Making Tags More Useful Anywhere on the Web
Tags in social tagging systems store meaning for the taggers who have entered them, and other users often share this understanding. The result of this, a folksonomy, is typically ...
Stephan Hagemann, Gottfried Vossen
PE
2007
Springer
100views Optimization» more  PE 2007»
13 years 9 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...