Sciweavers

834 search results - page 100 / 167
» Quantifying and Measuring Anonymity
Sort
View
SACMAT
2004
ACM
14 years 3 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
WWW
2010
ACM
14 years 3 months ago
Redundancy detection in service-oriented systems
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Peep Küngas, Marlon Dumas
SIGIR
2003
ACM
14 years 3 months ago
On the effectiveness of evaluating retrieval systems in the absence of relevance judgments
Soboroff, Nicholas and Cahan recently proposed a method for evaluating the performance of retrieval systems without relevance judgments. They demonstrated that the system evaluat...
Javed A. Aslam, Robert Savell
CCGRID
2002
IEEE
14 years 3 months ago
User-Centric Performance Analysis of Market-Based Cluster Batch Schedulers
This paper presents a performance analysis of marketbased batch schedulers for clusters of workstations. In contrast to previous work, we use user-centric performance metrics as t...
Brent N. Chun, David E. Culler
GECCO
2010
Springer
162views Optimization» more  GECCO 2010»
14 years 2 months ago
Heuristics for sampling repetitions in noisy landscapes with fitness caching
For many large-scale combinatorial search/optimization problems, meta-heuristic algorithms face noisy objective functions, coupled with computationally expensive evaluation times....
Forrest Stonedahl, Susa H. Stonedahl