Sciweavers

14518 search results - page 2811 / 2904
» Two Problems for Sophistication
Sort
View
RECSYS
2010
ACM
13 years 10 months ago
Workshop on user-centric evaluation of recommender systems and their interfaces
In this paper, we aim to analyse the current level of usability on ten popular online websites utilising some kind of reputation system. The conducted heuristic and expert evaluat...
Bart P. Knijnenburg, Lars Schmidt-Thieme, Dirk G. ...
SIGCOMM
2010
ACM
13 years 10 months ago
Greening backbone networks: reducing energy consumption by shutting off cables in bundled links
In backbone networks, the line cards that drive the links between neighboring routers consume a large amount of energy. Since these networks are typically overprovisioned, selecti...
Will Fisher, Martin Suchara, Jennifer Rexford
SIGCOMM
2010
ACM
13 years 10 months ago
The case for active device drivers
We revisit the device-driver architecture supported by the majority of operating systems, where a driver is a passive object that does not have its own thread of control and is on...
Leonid Ryzhyk, Yanjin Zhu, Gernot Heiser
WISEC
2010
ACM
13 years 10 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
ECAI
2010
Springer
13 years 10 months ago
Optimal Task Migration in Service-Oriented Systems: Algorithms and Mechanisms
In service-oriented systems, such as grids and clouds, users are able to outsource complex computational tasks by procuring resources on demand from remote service providers. As th...
Sebastian Stein, Enrico Gerding, Nicholas R. Jenni...
« Prev « First page 2811 / 2904 Last » Next »