Sciweavers

3657 search results - page 718 / 732
» A Study of Practical Deduplication
Sort
View
ESWA
2010
109views more  ESWA 2010»
13 years 6 months ago
Visual and tangible interactions with physical and virtual objects using context-aware RFID
Radio Frequency Identification (RFID) has recently received a lot of attention as an augmentation and interface technology with physical and virtual objects in the ubiquitous comp...
Jae Yeol Lee, Dong Woo Seo, Byung Youn Song, Rajit...
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
INFOCOM
2010
IEEE
13 years 6 months ago
Improving QoS in BitTorrent-like VoD Systems
—In recent years a number of research efforts have focused on effective use of P2P-based systems in providing large scale video streaming services. In particular, live streaming ...
Yan Yang, Alix L. H. Chow, Leana Golubchik, Daniel...
INFOCOM
2010
IEEE
13 years 6 months ago
Throughput, Delay, and Mobility in Wireless Ad Hoc Networks
—Throughput capacity in wireless ad hoc networks has been studied extensively under many different mobility models such as i.i.d. mobility model, Brownian mobility model, random ...
Pan Li, Yuguang Fang, Jie Li
INTR
2010
157views more  INTR 2010»
13 years 6 months ago
Classifying the user intent of web queries using k-means clustering
Purpose – Web search engines are frequently used by people to locate information on the Internet. However, not all queries have an informational goal. Instead of information, so...
Ashish Kathuria, Bernard J. Jansen, Carolyn Hafern...