Sciweavers

8243 search results - page 1538 / 1649
» Can We Manage Trust
Sort
View
CIKM
2005
Springer
14 years 2 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
VSTTE
2005
Springer
14 years 2 months ago
Performance Validation on Multicore Mobile Devices
The validation of modern software systems on mobile devices needs to incorporate both functional and non-functional requirements. While some progress has been made in validating pe...
Thomas Hubbard, Raimondas Lencevicius, Edu Metz, G...
MIR
2004
ACM
92views Multimedia» more  MIR 2004»
14 years 2 months ago
Researchexplorer: gaining insights through exploration in multimedia scientific data
An increasing amount of heterogeneous information about scientific research is becoming available on-line. This potentially allows users to explore the information from multiple p...
Bo Gong, Rahul Singh, Ramesh Jain
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
14 years 2 months ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim
DOCENG
2003
ACM
14 years 2 months ago
UpLib: a universal personal digital library system
We describe the design and use of a personal digital library system, UpLib. The system consists of a full-text indexed repository accessed through an active agent via a Web interf...
William C. Janssen, Kris Popat
« Prev « First page 1538 / 1649 Last » Next »