Sciweavers

779 search results - page 135 / 156
» The convergence of social and technological networks
Sort
View
ICDCS
2011
IEEE
12 years 8 months ago
Competitive and Fair Medium Access Despite Reactive Jamming
Abstract—Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often...
Andréa W. Richa, Christian Scheideler, Stef...
WEBI
2009
Springer
14 years 3 months ago
Fast Matching for All Pairs Similarity Search
All pairs similarity search is the problem of finding all pairs of records that have a similarity score above the specified threshold. Many real-world systems like search engine...
Amit C. Awekar, Nagiza F. Samatova
HT
2009
ACM
14 years 3 months ago
Sixearch.org 2.0 peer application for collaborative web search
Sixearch.org is a peer application for social, distributed, adaptive Web search, which integrates the Sixearch.org protocol, a topical crawler, a document indexing system, a retri...
Namrata Lele, Le-Shin Wu, Ruj Akavipat, Filippo Me...
OTM
2007
Springer
14 years 3 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional bene...
Sören Preibusch
CISIS
2010
IEEE
14 years 2 months ago
Semantic Web Fostering Enterprise 2.0
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...