Sciweavers

1618 search results - page 283 / 324
» Privacy Interfaces for Information Management
Sort
View
ASPLOS
2006
ACM
15 years 10 months ago
Geiger: monitoring the buffer cache in a virtual machine environment
Virtualization is increasingly being used to address server management and administration issues like flexible resource allocation, service isolation and workload migration. In a...
Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi ...
SIGIR
2005
ACM
15 years 9 months ago
An industrial-strength content-based music recommendation system
We present a metadata free system for the interaction with massive collections of music, the MusicSurfer. MusicSurfer automatically extracts descriptions related to instrumentatio...
Pedro Cano, Markus Koppenberger, Nicolas Wack
VLDB
1994
ACM
121views Database» more  VLDB 1994»
15 years 8 months ago
An Overview of Repository Technology
A repository is a shareddatabaseof information aboutengineeredartifacts.Wedefinea repository manager to be a databaseapplication that suPports checkout/checkin, version and config...
Philip A. Bernstein, Umeshwar Dayal
134
Voted
GROUP
2009
ACM
15 years 10 months ago
Effects of feedback and peer pressure on contributions to enterprise social media
Increasingly, large organizations are experimenting with internal social media (e.g., blogs, forums) as a platform for widespread distributed collaboration. Contributions to their...
Michael J. Brzozowski, Thomas Sandholm, Tad Hogg
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
15 years 7 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine