Sciweavers

661 search results - page 107 / 133
» Online Mechanisms
Sort
View
CHI
2010
ACM
13 years 5 months ago
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishin...
Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumara...
CORR
2011
Springer
162views Education» more  CORR 2011»
13 years 2 months ago
Optimal Power Cost Management Using Stored Energy in Data Centers
Since the electricity bill of a data center constitutes a significant portion of its overall operational costs, reducing this has become important. We investigate cost reduction o...
Rahul Urgaonkar, Bhuvan Urgaonkar, Michael J. Neel...
JAISE
2011
179views more  JAISE 2011»
13 years 1 months ago
A hybrid probabilistic neural model for person tracking based on a ceiling-mounted camera
Person tracking is an important topic in ambient living systems as well as in computer vision. In particular, detecting a person from a ceiling-mounted camera is a challenge since ...
Wenjie Yan, Cornelius Weber, Stefan Wermter
SECON
2007
IEEE
14 years 5 months ago
Facilitating an Active Transmit-only RFID System Through Receiver-based Processing
— Many asset tracking applications demand long-lived, low-cost, and continuous monitoring of a large number of items, which has posed a significant challenge to today’s RFID d...
Yu Zhang, Gautam D. Bhanage, Wade Trappe, Yanyong ...
HPDC
2012
IEEE
12 years 1 months ago
Dynamic adaptive virtual core mapping to improve power, energy, and performance in multi-socket multicores
Consider a multithreaded parallel application running inside a multicore virtual machine context that is itself hosted on a multi-socket multicore physical machine. How should the...
Chang Bae, Lei Xia, Peter A. Dinda, John R. Lange