Sciweavers

8620 search results - page 1584 / 1724
» Modeling the Human in Human Factors
Sort
View
MOBILITY
2009
ACM
14 years 4 months ago
Mobile visual access to legacy voice-based applications
Vocal systems are a well-established reality. Examples of popular voice-based applications include helpdesk services, reservation systems, and vocal mailboxes. These services, tha...
Marco Avvenuti, Alessio Vecchio
SIGCOMM
2009
ACM
14 years 4 months ago
DECOR: DEClaritive network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundame...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
AINA
2008
IEEE
14 years 4 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
CCGRID
2008
IEEE
14 years 4 months ago
Grid Differentiated Services: A Reinforcement Learning Approach
—Large scale production grids are a major case for autonomic computing. Following the classical definition of Kephart, an autonomic computing system should optimize its own beha...
Julien Perez, Cécile Germain-Renaud, Bal&aa...
CEC
2008
IEEE
14 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
« Prev « First page 1584 / 1724 Last » Next »