- Full text PDF available (2)
— Crowdsourcing enables one to leverage the power of the crowd. Normally, it involves utilizing humans for tasks that machines have difficulty performing. We propose a system, delivered as a mobile service, which dynamically adapts to the application domain and selects a combination of human and machine crowdsourcing components. Our work is towards the… (More)
Despite the plethora of polls, surveys, and reports stating that most companies are embracing Big Data, there is slow adoption of Big Data technologies, like Hadoop, in enterprises. One of the primary reasons for this is that companies have significant investments in legacy languages and systems and the process of migrating to newer (Big Data) technologies… (More)
Crowd computing leverages human input in order to execute tasks that are computationally expensive, due to complexity and/or scale. Combined with automation, crowd computing can help solve problems efficiently and effectively. In this work, we introduce an elasticity framework that adaptively optimizes the use of human and automated software resources in… (More)
The authors present two cases of schizophrenia in young males who have malformations of the septum pellucidum, a thin sheet of cells and fibers located in the midline of the brain that separates the lateral ventricles. These cases are discussed in the context of newly proposed neurodevelopmental models of schizophrenia.
This is the Proceedings of the Ninth Workshop on Web 2.0 Security and Privacy (W2SP) 2015, held in San Jose, CA, USA, on May 21, 2015. The workshop was held as part of the IEEE Computer Society Security and Privacy Workshops, in conjunction with the IEEE Symposium on Security and Privacy.