Sciweavers

4445 search results - page 9 / 889
» Reflective Authorization Systems
Sort
View
AVI
2006
13 years 11 months ago
Contrasting portraits of email practices: visual approaches to reflection and analysis
Over time, many people accumulate extensive email repositories that contain detailed information about their personal communication patterns and relationships. We present three vi...
Adam Perer, Marc A. Smith
CCR
2006
101views more  CCR 2006»
13 years 9 months ago
Reflections on network architecture: an active networking perspective
After a long period when networking research seemed to be focused mainly on making the existing Internet work better, interest in "clean slate" approaches to network arc...
Kenneth L. Calvert
WECWIS
2007
IEEE
159views ECommerce» more  WECWIS 2007»
14 years 4 months ago
A Rapid Egocentric Search Scheme Using Authority Estimation in Blog Space
A blog is a new media that is receiving a lot of attention. Its links enable us to get a hold of social relations between bloggers in a blog space, and the relations reflect blogg...
Yoonjae Jeong, Dongman Lee
CL
2008
Springer
13 years 10 months ago
Unanticipated partial behavioral reflection: Adapting applications at runtime
Dynamic, unanticipated adaptation of running systems is of interest in a variety of situations, ranging from functional upgrades to on-the-fly debugging or monitoring of critical ...
David Röthlisberger, Marcus Denker, Ér...
EDM
2010
152views Data Mining» more  EDM 2010»
13 years 11 months ago
Mining Students' Interaction Data from a System that Support Learning by Reflection
In this paper we utilising some popular educational data mining (EDM) methods to explore and mine educational data resulted from a system that supports reflection for learning call...
Rajibussalim