Sciweavers

515 search results - page 46 / 103
» A Strategy for Information Source Identification
Sort
View
110
Voted
CSCW
1998
ACM
15 years 7 months ago
Just Talk to Me: A Field Study of Expertise Location
Everyday, people in organizations must solve their problems to get their work accomplished. To do so, they often must find others with knowledge and information. Systems that assi...
David W. McDonald, Mark S. Ackerman
139
Voted
ICCNMC
2005
Springer
15 years 9 months ago
Curve-Based Greedy Routing Algorithm for Sensor Networks
Routing packets along a specified curve is a new approach to forwarding packets in large-scale dense sensor networks. Forwarding packets along trajectories can be very effective in...
Jin Zhang, Yaping Lin, Mu Lin, Ping Li, Si-wang Zh...
132
Voted
IRI
2006
IEEE
15 years 9 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
123
Voted
NLUCS
2004
15 years 4 months ago
Making Cognitive Summarization Agents Work In A Real-World Domain
The advantage of cognitively motivated automatic summarizing is that human users can better understand what happens. This improves acceptability. The basic empirical finding in hum...
Brigitte Endres-Niggemeyer, Elisabeth Wansorra
123
Voted
ICC
2007
IEEE
108views Communications» more  ICC 2007»
15 years 10 months ago
Quantum Cryptography For Secure Optical Networks
Dense Wavelength Division Multiplexing optical networks transport a huge aggregate traffic exceeding Tbps per single fiber, and passive optical network technology has been extended...
Stamatios V. Kartalopoulos