Sciweavers

8492 search results - page 1631 / 1699
» Modelling and Design of Multi-Agent Systems
Sort
View
WSDM
2010
ACM
166views Data Mining» more  WSDM 2010»
14 years 6 months ago
Ranking Mechanisms in Twitter-Like Forums
We study the problem of designing a mechanism to rank items in forums by making use of the user reviews such as thumb and star ratings. We compare mechanisms where forum users rat...
Anish Das Sarma, Atish Das Sarma, Sreenivas Gollap...
SIGIR
2009
ACM
14 years 3 months ago
An aspectual interface for supporting complex search tasks
With the increasing importance of search systems on the web, there is a continuing push to design interfaces which are a better match with the kinds of real-world tasks in which u...
Robert Villa, Iván Cantador, Hideo Joho, Jo...
SOUPS
2005
ACM
14 years 2 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
IPPS
1999
IEEE
14 years 1 months ago
Non-Preemptive Scheduling of Real-Time Threads on Multi-Level-Context Architectures
The rapid progress in high-performance microprocessor design has made it di cult to adapt real-time scheduling results to new models of microprocessor hardware, thus leaving an un...
Jan Jonsson, Henrik Lönn, Kang G. Shin
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
14 years 11 days ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
« Prev « First page 1631 / 1699 Last » Next »