Sciweavers

1811 search results - page 206 / 363
» Facilitation, Systems, and Users: The Complete Socio-Technic...
Sort
View
AINA
2006
IEEE
14 years 2 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
ICPPW
2006
IEEE
14 years 2 months ago
A Toolkit-Based Approach to Indoor Localization
Location is one of the most important contexts used in the applications in the pervasive computing environments . It helps the application do the right thing at the right place. O...
Yu Wang, Adam Harder
P2P
2005
IEEE
137views Communications» more  P2P 2005»
14 years 1 months ago
The Essence of P2P: A Reference Architecture for Overlay Networks
The success of the P2P idea has created a huge diversity of approaches, among which overlay networks, for example, Gnutella, Kazaa, Chord, Pastry, Tapestry, P-Grid, or DKS, have r...
Karl Aberer, Luc Onana Alima, Ali Ghodsi, Sarunas ...
MM
2005
ACM
112views Multimedia» more  MM 2005»
14 years 1 months ago
MediaMill: exploring news video archives based on learned semantics
In this technical demonstration we showcase the MediaMill system. A search engine that facilitates access to news video archives at a semantic level. The core of the system is an ...
Cees Snoek, Marcel Worring, Jan van Gemert, Jan-Ma...
SOFTVIS
2005
ACM
14 years 1 months ago
Visualizing multiple evolution metrics
Observing the evolution of very large software systems is difficult because of the sheer amount of information that needs to be analyzed and because the changes performed in the s...
Martin Pinzger, Harald Gall, Michael Fischer, Mich...