Sciweavers

221 search results - page 43 / 45
» Exploiting Social Interactions in Mobile Systems
Sort
View
CIKM
2005
Springer
14 years 1 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
P2P
2006
IEEE
229views Communications» more  P2P 2006»
14 years 1 months ago
Cost-Aware Processing of Similarity Queries in Structured Overlays
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...
Marcel Karnstedt, Kai-Uwe Sattler, Manfred Hauswir...
CSCW
2004
ACM
13 years 7 months ago
Roles of Orientation in Tabletop Collaboration: Comprehension, Coordination and Communication
Abstract. In order to support co-located collaboration, many researchers are now investigating how to effectively augment tabletops with electronic displays. As far back as 1988, o...
Russell Kruger, M. Sheelagh T. Carpendale, Stacey ...
ATAL
2004
Springer
14 years 28 days ago
Adaptive Information Infrastructures for the e-Society
Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
Mihaela Ulieru
AVI
2006
13 years 9 months ago
The ASPICE project: inclusive design for the motor disabled
The ASPICE project aims at the development of a system which allows the neuromotor disabled persons to improve or recover their mobility (directly or by emulation) and communicati...
Fabio Aloise, Febo Cincotti, Fabio Babiloni, Maria...