Sciweavers

592 search results - page 13 / 119
» Competition, Cooperation, and Authorization
Sort
View
ECIR
2010
Springer
13 years 9 months ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
CRYPTOLOGIA
2006
67views more  CRYPTOLOGIA 2006»
13 years 7 months ago
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition ...
Joshua Holden, Richard Layton, Laurence D. Merkle,...
VLDB
1995
ACM
59views Database» more  VLDB 1995»
13 years 11 months ago
Towards a Cooperative Transaction Model - The Cooperative Activity Model
With the emergence of cooperative applications it turned out that traditional transaction concepts are not suitable for these scenarios. Isolation of transactions, as guaranteed b...
Marek Rusinkiewicz, Wolfgang Klas, Thomas Tesch, J...
CHI
2006
ACM
14 years 7 months ago
Cooperative gestures: multi-user gestural interactions for co-located groupware
Multi-user, touch-sensing input devices create opportunities for the use of cooperative gestures ? multi-user gestural interactions for single display groupware. Cooperative gestu...
Meredith Ringel Morris, Anqi Huang, Andreas Paepck...
GLOBECOM
2009
IEEE
13 years 11 months ago
CoRe-MAC: A MAC-Protocol for Cooperative Relaying in Wireless Networks
Cooperative relaying methods can improve wireless links, but introduce overhead due to relay selection and resource reservation compared to non-cooperative transmission. In order t...
Helmut Adam, Wilfried Elmenreich, Christian Bettst...