Sciweavers

905 search results - page 176 / 181
» Implementing Learning Content Management
Sort
View
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
14 years 2 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
CTW
2006
112views more  CTW 2006»
13 years 8 months ago
Cross border railway operations: improving safety at cultural interfaces
Organizations with different cultures will be increasingly required to interface with each other as legislation is introduced to ensure the interoperability of railway systems acr...
S. O. Johnsen, J. Vatn, R. Rosness, I. A. Herrera
EDBT
2010
ACM
151views Database» more  EDBT 2010»
14 years 1 months ago
Warm cache costing: a feedback optimization technique for buffer pool aware costing
Most modern RDBMS depend on the query processing optimizer’s cost model to choose the best execution plan for a given query. Since the physical IO (PIO) is a costly operation to...
H. S. Ramanujam, Edwin Seputis
CCS
2006
ACM
14 years 9 days ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
SENSYS
2010
ACM
13 years 6 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...