Sciweavers

1818 search results - page 341 / 364
» How users use access control
Sort
View
EUROSYS
2010
ACM
14 years 6 months ago
Q-Clouds: Managing Performance Interference Effects for QoS-Aware Clouds
Cloud computing offers users the ability to access large pools of computational and storage resources on demand. Multiple commercial clouds already allow businesses to replace, or...
Ripal Nathuji, Aman Kansal, Alireza Ghaffarkhah
JVCIR
2007
231views more  JVCIR 2007»
13 years 8 months ago
Painting in High Dynamic Range
We present a novel approach that allows users to intuitively and interactively manipulate High Dynamic Range (HDR) images using commonly available Low Dynamic Range (LDR) displays...
Mark Colbert, E. Reinhard, Charles E. Hughes
HPDC
2006
IEEE
14 years 3 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter
WWW
2006
ACM
14 years 9 months ago
Exploring social annotations for the semantic web
In order to obtain a machine understandable semantics for web resources, research on the Semantic Web tries to annotate web resources with concepts and relations from explicitly d...
Xian Wu, Lei Zhang, Yong Yu
WWW
2004
ACM
14 years 9 months ago
Personalization in distributed e-learning environments
Personalized support for learners becomes even more important, when e-Learning takes place in open and dynamic learning and information networks. This paper shows how to realize p...
Peter Dolog, Nicola Henze, Wolfgang Nejdl, Michael...