Sciweavers

3451 search results - page 560 / 691
» Collaborative attack modeling
Sort
View
TWC
2008
156views more  TWC 2008»
13 years 9 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou
CSCW
2000
ACM
13 years 9 months ago
Tailoring Groupware: The Cooperative Hypermedia Approach
Tailoring groupware has to deal with adapting properties of a shared information space as well as with adapting properties of the cooperation support to the group's needs. In...
Weigang Wang, Jörg M. Haake
CSCW
2002
ACM
13 years 9 months ago
Explaining effects of eye gaze on mediated group conversations: : amount or synchronization?
We present an experiment examining effects of gaze on speech during three-person conversations. Understanding such effects is crucial for the design of teleconferencing systems an...
Roel Vertegaal, Yaping Ding
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
13 years 8 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus
ICDM
2010
IEEE
193views Data Mining» more  ICDM 2010»
13 years 7 months ago
Supervised Link Prediction Using Multiple Sources
Link prediction is a fundamental problem in social network analysis and modern-day commercial applications such as Facebook and Myspace. Most existing research approaches this pro...
Zhengdong Lu, Berkant Savas, Wei Tang, Inderjit S....