Sciweavers

6894 search results - page 1292 / 1379
» On network interference management
Sort
View
CLEF
2010
Springer
15 years 5 months ago
A Cluster-Based Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
In this paper we describe a cluster-based plagiarism detection method, which we have used in the learning management system of SCUT to detect plagiarism in the network engineering ...
Du Zou, Wei-jiang Long, Zhang Ling
192
Voted
CSCW
2012
ACM
14 years 9 days ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
ICONFERENCE
2012
14 years 6 days ago
Rural anchor institution broadband connectivity: enablers and barriers to adoption
This paper presents findings from two research projects that entail needs assessments, benchmarking, and onsite diagnostics of anchor institutions in support of multi-million doll...
Lauren H. Mandel, Nicole D. Alemanne, Charles R. M...
158
Voted
IUI
2012
ACM
14 years 6 days ago
Summarizing sporting events using twitter
The status updates posted to social networks, such as Twitter and Facebook, contain a myriad of information about what people are doing and watching. During events, such as sports...
Jeffrey Nichols, Jalal Mahmud, Clemens Drews
196
Voted
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
13 years 7 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
« Prev « First page 1292 / 1379 Last » Next »