Sciweavers

408 search results - page 53 / 82
» Tailoring Privacy to Users' Needs
Sort
View
WDAG
2004
Springer
98views Algorithms» more  WDAG 2004»
14 years 1 months ago
Dynamic Memory ABP Work-Stealing
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (hencheforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of ch...
Danny Hendler, Yossi Lev, Nir Shavit
WEBDB
2004
Springer
125views Database» more  WEBDB 2004»
14 years 1 months ago
Best-Match Querying from Document-Centric XML
On the Web, there is a pervasive use of XML to give lightweight semantics to textual collections. Such documentcentric XML collections require a query language that can gracefully...
Jaap Kamps, Maarten Marx, Maarten de Rijke, Bö...
PCI
2001
Springer
14 years 12 days ago
A Knowledge Based Approach on Educational Metadata Use
One of the most rapidly evolving e-services is e-Learning, that is, the creation of advanced educational resources that are accessible on-line and, potentially, offer numerous adva...
Fotis Kokkoras, Demetrios G. Sampson, Ioannis P. V...
CHI
2000
ACM
14 years 10 days ago
Developing a context-aware electronic tourist guide: some issues and experiences
In this paper, we describe our experiences of developing and evaluating GUIDE, an intelligent electronic tourist guide. The GUIDE system has been built to overcome many of the lim...
Keith Cheverst, Nigel Davies, Keith Mitchell, Adri...
CSMR
1998
IEEE
14 years 7 days ago
A Method for Assessing Legacy Systems for Evolution
Legacy systems are usually critical to the business in which they operate, but the costs of running them are often not justifiable. Determining whether such systems are worth keep...
Jane Ransom, Ian Sommerville, Ian Warren