Sciweavers

5829 search results - page 1120 / 1166
» The Practice of Cluster Analysis
Sort
View
GROUP
2003
ACM
14 years 2 months ago
"Breaking the code", moving between private and public work in collaborative software development
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is esp...
Cleidson R. B. de Souza, David F. Redmiles, Paul D...
IUI
2003
ACM
14 years 2 months ago
A model of textual affect sensing using real-world knowledge
This paper presents a novel way for assessing the affective qualities of natural language and a scenario for its use. Previous approaches to textual affect sensing have employed k...
Hugo Liu, Henry Lieberman, Ted Selker
SACMAT
2003
ACM
14 years 2 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
SASN
2003
ACM
14 years 2 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
SIGMETRICS
2003
ACM
119views Hardware» more  SIGMETRICS 2003»
14 years 2 months ago
Incrementally improving lookup latency in distributed hash table systems
Distributed hash table (DHT) systems are an important class of peer-to-peer routing infrastructures. They enable scalable wide-area storage and retrieval of information, and will ...
Hui Zhang 0002, Ashish Goel, Ramesh Govindan
« Prev « First page 1120 / 1166 Last » Next »