Sciweavers

2492 search results - page 469 / 499
» False-Name-Proofness in Social Networks
Sort
View
AAAI
2006
13 years 11 months ago
Extracting Knowledge about Users' Activities from Raw Workstation Contents
A long-standing goal of AI is the development of intelligent workstation-based personal agents to assist users in their daily lives. A key impediment to this goal is the unrealist...
Tom M. Mitchell, Sophie H. Wang, Yifen Huang, Adam...
CRIWG
2004
13 years 11 months ago
An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups
Collaborative distance learning involves a variety of elements and factors that have to be considered and measured in order to analyse and assess group and individual performance m...
Thanasis Daradoumis, Alejandra Martínez-Mon...
APVIS
2001
13 years 11 months ago
Visual Mapping of Articulable Tacit Knowledge
Tacit knowledge has long been recognised, however its research has focused largely on who is more likely to have this store of knowledge, rather than taking this one step further ...
Peter Busch, Debbie Richards, Christopher N. G. Da...
ATAL
2010
Springer
13 years 11 months ago
Automated negotiation with decommitment for dynamic resource allocation in cloud computing
We consider the problem of allocating networked resources in dynamic environment, such as cloud computing platforms, where providers strategically price resources to maximize thei...
Bo An, Victor R. Lesser, David Irwin, Michael Zink
CCGRID
2010
IEEE
13 years 11 months ago
A Categorisation of Cloud Computing Business Models
- This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. We classify clou...
Victor Chang, David A. Bacigalupo, Gary Wills, Dav...