Sciweavers

282 search results - page 49 / 57
» Collaborative Intrusion Prevention
Sort
View
P2P
2007
IEEE
14 years 1 months ago
Rescuing Tit-for-Tat with Source Coding
Tit-for-tat is widely believed to be the most effective strategy to enforce collaboration among selfish users. However, it has been shown that its usefulness for decentralized an...
Thomas Locher, Stefan Schmid, Roger Wattenhofer
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
14 years 1 months ago
E-Government: The Need for Effective Process Management in the Public Sector
The concept of e-government has evolved from the domain of e-business where enterprises need to collaborate with partners, suppliers and customers for the effective delivery of e-...
Vishanth Weerakkody, Simon Baire, Jyoti Choudrie
ICMCS
2006
IEEE
148views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Directing Attention in Online Aggregate Sensor Streams via Auditory Blind Value Assignment
Multiparty collaborative applications in which groups of people act in concert to achieve some real-world goal abound. In these situations, it is useful for a central planning age...
Robert Malkin, Datong Chen, Jie Yang, Alex Waibel
CSCW
2004
ACM
14 years 27 days ago
QnA: augmenting an instant messaging client to balance user responsiveness and performance
The growing use of Instant Messaging for social and work-related communication has created a situation where incoming messages often become a distraction to users while they are p...
Daniel Avrahami, Scott E. Hudson
CSCW
2004
ACM
14 years 27 days ago
Lilsys: Sensing Unavailability
As communications systems increasingly gather and propagate information about people’s reachability or “presence”, users need better tools to minimize undesired interruption...
James Begole, Nicholas E. Matsakis, John C. Tang