Sciweavers

274 search results - page 49 / 55
» Security user studies: methodologies and best practices
Sort
View
SIGMOD
2006
ACM
117views Database» more  SIGMOD 2006»
14 years 7 months ago
Database support for matching: limitations and opportunities
We define a match join of R and S with predicate to be a subset of the -join of R and S such that each tuple of R and S contributes to at most one result tuple. Match joins and t...
Ameet Kini, Srinath Shankar, Jeffrey F. Naughton, ...
ICDE
2008
IEEE
110views Database» more  ICDE 2008»
14 years 8 months ago
Standing Out in a Crowd: Selecting Attributes for Maximum Visibility
In recent years, there has been significant interest in development of ranking functions and efficient top-k retrieval algorithms to help users in ad-hoc search and retrieval in da...
Muhammed Miah, Gautam Das, Vagelis Hristidis, Heik...
INFSOF
2006
72views more  INFSOF 2006»
13 years 7 months ago
Partial rollback in object-oriented/object-relational database management systems with dual buffer
Partial rollback mechanism has been widely supported by many database management systems (DBMSs). It allows a transaction to be rolled back partially, that is, only back to a cert...
Won-Young Kim, Byung Suk Lee, Kyu-Young Whang
HCI
2009
13 years 5 months ago
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...
Takayuki Nozawa, Toshiyuki Kondo
CHI
2011
ACM
12 years 11 months ago
User-defined motion gestures for mobile interaction
Modern smartphones contain sophisticated sensors to monitor three-dimensional movement of the device. These sensors permit devices to recognize motion gestures— deliberate movem...
Jaime Ruiz, Yang Li, Edward Lank