Sciweavers

511 search results - page 86 / 103
» Organization Detection Using Emergent Computing
Sort
View
IWCMC
2009
ACM
14 years 2 months ago
On fault tolerant ad hoc network design
Minimal configuration and quick deployment of ad hoc networks make it suitable for numerous applications such as emergency situations, border monitoring, and military missions, e...
Wasim El-Hajj, Hazem Hajj, Zouheir Trabelsi
CHI
2002
ACM
14 years 8 months ago
Effects of four computer-mediated communications channels on trust development
When virtual teams need to establish trust at a distance, it is advantageous for them to use rich media to communicate. We studied the emergence of trust in a social dilemma game ...
Nathan Bos, Judith S. Olson, Darren Gergle, Gary M...
WWW
2011
ACM
13 years 2 months ago
Finding hierarchy in directed online social networks
Social hierarchy and stratification among humans is a well studied concept in sociology. The popularity of online social networks presents an opportunity to study social hierarch...
Mangesh Gupte, Pravin Shankar, Jing Li, S. Muthukr...
DGO
2011
237views Education» more  DGO 2011»
12 years 7 months ago
Modeling digital preservation capabilities in enterprise architecture
The rising awareness of the challenges of preserving information over the long term has led to a wealth of initiatives developing economic models, methods, tools, systems, guideli...
Christoph Becker, Gonçalo Antunes, Jos&eacu...
IMC
2009
ACM
14 years 2 months ago
Where's that phone?: geolocating IP addresses on 3G networks
Cell phones connected to high-speed 3G networks constitute an increasingly important class of clients on the Internet. From the viewpoint of the servers they connect to, such devi...
Mahesh Balakrishnan, Iqbal Mohomed, Venugopalan Ra...