Sciweavers

1066 search results - page 191 / 214
» A new perspective on
Sort
View
UMUAI
2008
144views more  UMUAI 2008»
13 years 8 months ago
Tag-based user modeling for social multi-device adaptive guides
This paper aims to demonstrate that the principles of adaptation and user modeling, especially social annotation, can be integrated fruitfully with those of the Web 2.0 paradigm a...
Francesca Carmagnola, Federica Cena, Luca Console,...
DCOSS
2006
Springer
14 years 4 days ago
Lifetime Maximization of Sensor Networks Under Connectivity and k-Coverage Constraints
In this paper, we study the fundamental limits of a wireless sensor network's lifetime under connectivity and k-coverage constraints. We consider a wireless sensor network wit...
Wei Mo, Daji Qiao, Zhengdao Wang
CHI
2007
ACM
14 years 8 months ago
Moving ux into a position of corporate influence: whose advice really works?
Professionals working to move user experience (UX) into a position of corporate influence are impeded by conflicting recommendations, including those regarding the roles of docume...
Richard I. Anderson, Jeremy Ashley, Tobias Herrman...
DASFAA
2007
IEEE
160views Database» more  DASFAA 2007»
14 years 2 months ago
Implementation of Bitmap Based Incognito and Performance Evaluation
In the era of the Internet, more and more privacy-sensitive data is published online. Even though this kind of data are published with sensitive attributes such as name and social ...
Hyun-Ho Kang, Jae-Myung Kim, Gap-Joo Na, Sang-Won ...
VIZSEC
2005
Springer
14 years 1 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...