Sciweavers

2747 search results - page 463 / 550
» Network externalities in software systems
Sort
View
CEC
2008
IEEE
14 years 3 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
COMSWARE
2008
IEEE
14 years 3 months ago
An efficient and bandwidth sensitive parallel download scheme in data grids
—For modern scientific applications such as astrophysics, astronomy, aerography, and biology, a large amount of storage space is required because of the large-scale datasets. Dat...
Ruay-Shiung Chang, Chun-Fu Lin, Jiing-Hsing Ruey, ...
IPPS
2008
IEEE
14 years 3 months ago
Scalable server provisioning with HOP-SCOTCH
The problem of provisioning servers in a cluster infrastructure includes the issues of coordinating access and sharing of physical resources, loading servers with the appropriate ...
David Daly, M. A. Silva, José E. Moreira
IUI
2006
ACM
14 years 2 months ago
A goal-oriented interface to consumer electronics using planning and commonsense reasoning
We are reaching a crisis with design of user interfaces for consumer electronics. Flashing 12:00 time indicators, push-andhold buttons, and interminable modes and menus are all sy...
Henry Lieberman, José H. Espinosa
IUI
2005
ACM
14 years 2 months ago
Designing interfaces for guided collection of knowledge about everyday objects from volunteers
A new generation of intelligent applications can be enabled by broad-coverage knowledge repositories about everyday objects. We distill lessons in design of intelligent user inter...
Timothy Chklovski