Sciweavers

2244 search results - page 364 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
CCS
2004
ACM
14 years 3 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
MOBIHOC
2009
ACM
14 years 10 months ago
Delay and effective throughput of wireless scheduling in heavy traffic regimes: vacation model for complexity
Distributed scheduling algorithms for wireless ad hoc networks have received substantial attention over the last decade. The complexity levels of these algorithms span a wide spec...
Yung Yi, Junshan Zhang, Mung Chiang
MOBISYS
2010
ACM
14 years 18 days ago
Anatomizing application performance differences on smartphones
The use of cellular data networks is increasingly popular due to the widespread deployment of 3G technologies and the rapid adoption of smartphones, such as iPhone and GPhone. Bes...
Junxian Huang, Qiang Xu, Birjodh Tiwana, Zhuoqing ...
CHI
2004
ACM
14 years 10 months ago
A commonsense approach to predictive text entry
People cannot type as fast as they think, especially when faced with the constraints of mobile devices. There have been numerous approaches to solving this problem, including rese...
Tom Stocky, Alexander Faaborg, Henry Lieberman
CSCW
2011
ACM
13 years 1 months ago
Browse and discover: social file sharing in the enterprise
There is a growth in the popularity of social file sharing systems. This paper describes the design of Cattail, a social file sharing system for the enterprise. Through a ‘Recen...
N. Sadat Shami, Michael J. Muller, David R. Millen