Sciweavers

897 search results - page 48 / 180
» Identity: How to name it, How to find it
Sort
View
HICSS
2007
IEEE
117views Biometrics» more  HICSS 2007»
14 years 3 months ago
Offering Mobile Security as a Service
The objective of this paper is to study how a software product company can expand its productbased business with the Software as a Service (SaaS) model into the mobile setting. We...
Aki Lassila
CSCW
2000
ACM
14 years 1 months ago
Interaction and outeraction: instant messaging in action
We discuss findings from an ethnographic study of instant messaging (IM) in the workplace and its implications for media theory. We describe how instant messaging supports a varie...
Bonnie A. Nardi, Steve Whittaker, Erin Bradner
RSP
1999
IEEE
14 years 1 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
NIPS
2008
13 years 10 months ago
Differentiable Sparse Coding
Prior work has shown that features which appear to be biologically plausible as well as empirically useful can be found by sparse coding with a prior such as a laplacian (L1) that...
J. Andrew Bagnell, David M. Bradley
CN
2006
56views more  CN 2006»
13 years 8 months ago
Maximizing remote work in flooding-based peer-to-peer systems
In peer-to-peer (P2P) systems where individual peers must cooperate to process each other's requests, a useful metric for evaluating the system is how many remote requests ar...
Qixiang Sun, Neil Daswani, Hector Garcia-Molina