Sciweavers

540 search results - page 101 / 108
» Towards User Modeling Meta-ontology
Sort
View
SIGCOMM
2010
ACM
13 years 7 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
SOFTVIS
2010
ACM
13 years 6 months ago
TIE: an interactive visualization of thread interleavings
Multi-core processors have become increasingly prevalent, driving a software shift toward concurrent programs which best utilize these processors. Testing and debugging concurrent...
Gowritharan Maheswara, Jeremy S. Bradbury, Christo...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 6 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
WSC
2004
13 years 8 months ago
Data and Metadata Requirements for Composable Mission Space Environments
Composability is the capability to select and assemble reusable simulation components in various combinations into simulation systems to meet user requirements. The Defense Modeli...
Katherine L. Morse
IJMMS
2006
94views more  IJMMS 2006»
13 years 6 months ago
A framework for understanding trust factors in web-based health advice
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper ...
Elizabeth Sillence, Pamela Briggs, Peter Harris, L...