Sciweavers

5511 search results - page 1031 / 1103
» Security for Network Places
Sort
View
CE
2008
122views more  CE 2008»
13 years 9 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
JSA
2008
136views more  JSA 2008»
13 years 9 months ago
Evaluation and optimization of a peer-to-peer video-on-demand system
Video-on-demand (VoD) is increasingly popular with internet users. However, VoD is costly due to the load placed on video servers. Peer-to-peer (P2P) techniques are an approach to...
Bin Cheng, Xiuzheng Liu, Zheng Zhang, Hai Jin, Lex...
KER
2008
193views more  KER 2008»
13 years 9 months ago
The 1st international workshop on computational social choice
Computational social choice is a new discipline currently emerging at the interface of social choice theory and computer science. It is concerned with the application of computati...
Ulle Endriss
SIAMCOMP
2008
167views more  SIAMCOMP 2008»
13 years 9 months ago
Approximation Algorithms for Data Placement Problems
We develop approximation algorithms for the problem of placing replicated data in arbitrary networks, where the nodes may both issue requests for data objects and have capacity fo...
Ivan D. Baev, Rajmohan Rajaraman, Chaitanya Swamy
ETS
2000
IEEE
220views Hardware» more  ETS 2000»
13 years 9 months ago
Law On-Line: A Collaborative, Web-Based Journey in the Law and Social Sciences
During Spring 1998, we embarked on pedagogical journey into unknown terrains -- the terrains of collaborative teaching and World Wide Web instruction. In this paper we present a j...
Cynthia L. Cates, Wayne V. McIntosh
« Prev « First page 1031 / 1103 Last » Next »