Sciweavers

2747 search results - page 409 / 550
» Network externalities in software systems
Sort
View
JUCS
2008
166views more  JUCS 2008»
13 years 9 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
14 years 3 months ago
Unwitting distributed genetic programming via asynchronous JavaScript and XML
The success of a genetic programming system in solving a problem is often a function of the available computational resources. For many problems, the larger the population size an...
Jon Klein, Lee Spector
EUROSYS
2008
ACM
14 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
MAGS
2008
104views more  MAGS 2008»
13 years 9 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
MSS
2003
IEEE
98views Hardware» more  MSS 2003»
14 years 2 months ago
A Performance Analysis of the iSCSI Protocol
Fibre channel has long dominated the realm of storage area networks (SAN’s). However, with increased development and refining, iSCSI is fast becoming an equal contender, which ...
Stephen Aiken, Dirk Grunwald, Andrew R. Pleszkun, ...