Sciweavers

515 search results - page 101 / 103
» Automated Social Network Analysis for Collaborative Work
Sort
View
ECIS
2003
13 years 8 months ago
Emerging organisations: metateams in major IT projects
During the last decade, teams working on information technology (IT) development and implementation projects have experienced significant transformations. Nowadays, many members o...
Walter D. Fernández, Alan Underwood
WWW
2004
ACM
14 years 8 months ago
Anti-aliasing on the web
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a doubleedged sword. On one hand, it is a fundamental building bloc...
Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li
GIS
2007
ACM
14 years 8 months ago
Evacuation route planning: scalable heuristics
Given a transportation network, a vulnerable population, and a set of destinations, evacuation route planning identifies routes to minimize the time to evacuate the vulnerable pop...
Sangho Kim, Betsy George, Shashi Shekhar
EUROSYS
2008
ACM
14 years 4 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman