Sciweavers

4445 search results - page 9 / 889
» Reflective Authorization Systems
Sort
View
114
Voted
AVI
2006
15 years 4 months ago
Contrasting portraits of email practices: visual approaches to reflection and analysis
Over time, many people accumulate extensive email repositories that contain detailed information about their personal communication patterns and relationships. We present three vi...
Adam Perer, Marc A. Smith
105
Voted
CCR
2006
101views more  CCR 2006»
15 years 2 months ago
Reflections on network architecture: an active networking perspective
After a long period when networking research seemed to be focused mainly on making the existing Internet work better, interest in "clean slate" approaches to network arc...
Kenneth L. Calvert
121
Voted
WECWIS
2007
IEEE
159views ECommerce» more  WECWIS 2007»
15 years 9 months ago
A Rapid Egocentric Search Scheme Using Authority Estimation in Blog Space
A blog is a new media that is receiving a lot of attention. Its links enable us to get a hold of social relations between bloggers in a blog space, and the relations reflect blogg...
Yoonjae Jeong, Dongman Lee
106
Voted
CL
2008
Springer
15 years 2 months ago
Unanticipated partial behavioral reflection: Adapting applications at runtime
Dynamic, unanticipated adaptation of running systems is of interest in a variety of situations, ranging from functional upgrades to on-the-fly debugging or monitoring of critical ...
David Röthlisberger, Marcus Denker, Ér...
111
Voted
EDM
2010
152views Data Mining» more  EDM 2010»
15 years 4 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim