Sciweavers

367 search results - page 70 / 74
» Novelty and Collective Attention
Sort
View
MP
2002
165views more  MP 2002»
13 years 7 months ago
A feasible semismooth asymptotically Newton method for mixed complementarity problems
Semismooth Newton methods constitute a major research area for solving mixed complementarity problems (MCPs). Early research on semismooth Newton methods is mainly on infeasible me...
Defeng Sun, Robert S. Womersley, Houduo Qi
PUC
2007
152views more  PUC 2007»
13 years 6 months ago
Back to the shed: gendered visions of technology and domesticity
One of the tropes of the age of ubiquitous computing is the migration of computation into new spaces. Domestic environments have been a particular focus of attention for many. Howe...
Genevieve Bell, Paul Dourish
IEEECIT
2010
IEEE
13 years 5 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
INFOCOM
2010
IEEE
13 years 5 months ago
Routing and Scheduling for Energy and Delay Minimization in the Powerdown Model
—Energy conservation is drawing increasing attention in data networking. One school of thought believes that a dominant amount of energy saving comes from turning off network ele...
Matthew Andrews, Antonio Fernández, Lisa Zh...
INFOCOM
2010
IEEE
13 years 5 months ago
BitTorrent Darknets
Abstract—A private BitTorrent site (also known as a “BitTorrent darknet”) is a collection of torrents that can only be accessed by members of the darknet community. The priva...
Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, ...