Sciweavers

583 search results - page 34 / 117
» More Reflections on
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
Incentive-compatible caching and peering in data-oriented networks
Several new, data-oriented internetworking architectures have been proposed recently. However, the practical deployability of such designs is an open question. In this paper, we c...
Jarno Rajahalme, Mikko Särelä, Pekka Nik...
DAGSTUHL
2004
13 years 10 months ago
Adaptive Rich Media Presentations via Preference-Based Constrained Optimization
Personalization and adaptation of multi-media messages are well known and well studied problems. Ideally, each message should reflect its recipient's interests, device capabi...
Ronen I. Brafman, Doron A. Friedman
CHI
2009
ACM
14 years 9 months ago
Studying appropriation of everyday technologies: a cognitive approach
The ways in which users appropriate uses of technology ? or invent new ones ? have attracted interest in CSCW-oriented research, but much less has been written on its cognitive fo...
Antti Salovaara
PAKDD
2004
ACM
183views Data Mining» more  PAKDD 2004»
14 years 2 months ago
Constraint-Based Graph Clustering through Node Sequencing and Partitioning
This paper proposes a two-step graph partitioning method to discover constrained clusters with an objective function that follows the well-known minmax clustering principle. Compar...
Yu Qian, Kang Zhang, Wei Lai
WWW
2008
ACM
14 years 9 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang