Sciweavers

2983 search results - page 462 / 597
» The group marriage problem
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 2 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
CHI
2010
ACM
14 years 1 months ago
What's your idea?: a case study of a grassroots innovation pipeline within a large software company
Establishing a grassroots innovation pipeline has come to the fore as strategy for nurturing innovation within large organizations. A key element of such pipelines is the use of a...
Brian P. Bailey, Eric Horvitz
COCOON
2010
Springer
14 years 1 months ago
Tracking a Generator by Persistence
The persistent homology provides a mathematical tool to describe “features” in a principled manner. The persistence algorithm proposed by Edelsbrunner et al. [9] can compute n...
Oleksiy Busaryev, Tamal K. Dey, Yusu Wang
PAKDD
2010
ACM
117views Data Mining» more  PAKDD 2010»
14 years 1 months ago
BASSET: Scalable Gateway Finder in Large Graphs
Given a social network, who is the best person to introduce you to, say, Chris Ferguson, the poker champion? Or, given a network of people and skills, who is the best person to he...
Hanghang Tong, Spiros Papadimitriou, Christos Falo...
SAC
2009
ACM
14 years 1 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas