Sciweavers

14348 search results - page 2769 / 2870
» Active Database Systems
Sort
View
CCS
2007
ACM
14 years 2 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
CHI
2007
ACM
14 years 2 months ago
Follow the reader: filtering comments on slashdot
Large-scale online communities need to manage the tension between critical mass and information overload. Slashdot is a news and discussion site that has used comment rating to al...
Cliff Lampe, Erik W. Johnston, Paul Resnick
CHIMIT
2007
ACM
14 years 2 months ago
Network-centricity: hindered by hierarchical anchors
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...
Steve Abrams, Gloria Mark
ELPUB
2007
ACM
14 years 2 months ago
Openness in Higher Education: Open Source, Open Standards, Open Access
For national advisory services in the UK (UKOLN, CETIS, and OSS Watch), varieties of openness (open source software, open standards, and open access to research publications and d...
Brian Kelly, Scott Wilson, Randy Metcalfe
ACMIDC
2010
14 years 2 months ago
Paper-based multimedia interaction as learning tool for disabled children
The purpose of our research is to support cognitive, motor, and emotional development of severely disabled children in the school context. We designed and implemented a set of nov...
Franca Garzotto, Manuel Bordogna
« Prev « First page 2769 / 2870 Last » Next »