Sciweavers

4078 search results - page 728 / 816
» The COMPASS Location System
Sort
View
USENIX
2007
14 years 20 days ago
DiskSeen: Exploiting Disk Layout and Access History to Enhance I/O Prefetch
Current disk prefetch policies in major operating systems track access patterns at the level of the file abstraction. While this is useful for exploiting application-level access...
Xiaoning Ding, Song Jiang, Feng Chen, Kei Davis, X...
AIMS
2008
Springer
14 years 11 days ago
Entwined Influences of Users' Behaviour and QoS: A Multi-model Approach
In distributed, dynamic networks and applications, such as Peer-to-Peer (P2P), users'behaviour and quality of service/quality of experiment1 are known to influence each other....
Julien Siebert, Vincent Chevrier, Laurent Ciarlett...
CCS
2008
ACM
14 years 10 days ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
CHI
2008
ACM
14 years 10 days ago
Cross-channel mobile social software: an empirical study
In this paper, we introduce a prototype system designed to support mobile group socializing that has been appropriated for everyday use by 150 users over 18 months. The system sup...
Clint Heyer, Margot Brereton, Stephen Viller
BIOSIG
2007
114views Biometrics» more  BIOSIG 2007»
13 years 11 months ago
Minutiae template conformance and interoperability issues
: Minutiae features extracted from finger images are widely used for automated fingerprint recognition. The conformance of minutiae templates to standardised data interchange forma...
Olaf Henniger, Dirk Scheuermann