Sciweavers

443 search results - page 88 / 89
» Deploying research technology in the home
Sort
View
CIKM
2008
Springer
13 years 10 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu
CSCW
2008
ACM
13 years 10 months ago
Understanding collective play in an urban screen game
In recent years there has been a growing interest in urban screen applications. While there have been several deployments of these technologies in our urban environments, surprisi...
Kenton O'Hara, Maxine Glancy, Simon Robertshaw
EUMAS
2006
13 years 9 months ago
A Customizable Multi-Agent System for Distributed Data Mining
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Giancarlo Fortino, Giuseppe Di Fatta
ISSA
2004
13 years 9 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
ADHOC
2010
138views more  ADHOC 2010»
13 years 8 months ago
On the feasibility of UMTS-based Traffic Information Systems
Intelligent Transportation Systems (ITS) are a hot topic in the communications society. Currently, research is primarily focusing on setting up Vehicular Ad Hoc Networks (VANETs) ...
Christoph Sommer, Armin Schmidt, Yi Chen, Reinhard...