Sciweavers

1870 search results - page 369 / 374
» Content-Based Recommendation Systems
Sort
View
WORM
2004
13 years 8 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
CCR
2008
101views more  CCR 2008»
13 years 7 months ago
Empirical evaluation of hash functions for multipoint measurements
A broad spectrum of network measurement applications demand passive multipoint measurements in which data from multiple observation points has to be correlated. Examples are the p...
Christian Henke, Carsten Schmoll, Tanja Zseby
CE
2008
122views more  CE 2008»
13 years 7 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
EJIS
2010
52views more  EJIS 2010»
13 years 7 months ago
Same technology, different outcome? Reinterpreting Barley's Technology as an Occasion for Structuring
In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for...
Starling David Hunter III
CORR
2006
Springer
180views Education» more  CORR 2006»
13 years 7 months ago
Social Networks and Social Information Filtering on Digg
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
Kristina Lerman