Sciweavers

1579 search results - page 31 / 316
» How Good is the Crowd at
Sort
View
MM
2000
ACM
112views Multimedia» more  MM 2000»
14 years 11 days ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
IFIP
2009
Springer
13 years 5 months ago
How to Foresee and Capture the Effects of RFID Implementation
RFID technology is, according to both industry and academia, one of the most promising new technologies for improving logistics and manufacturing excellence this decade. This resea...
Kristin Hergot, Lars Skjelstad
WWW
2008
ACM
14 years 8 months ago
How to influence my customers?: the impact of electronic market design
This paper investigates the strategic decisions of online vendors for offering different mechanism, such as sampling and online reviews of information products, to increase their ...
Nan Hu, Ling Liu, Bin Chen, Jialie Shen
WETICE
1997
IEEE
14 years 6 days ago
Boundaries, Awareness and Interaction in Collaborative Virtual Environments
This paper is concerned with how collaborative virtual environments can be structured in order to enable greater scalability and yet maintain a richness of communication. Based on...
Chris Greenhalgh, Steve Benford
NSDI
2004
13 years 9 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer