Sciweavers

2169 search results - page 336 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
231
Voted
P2P
2008
IEEE
15 years 11 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
MSWIM
2006
ACM
15 years 10 months ago
Routing in intermittent network topologies
The topic of this paper is the algorithmic development of routing techniques for Delay Tolerant Networks (DTNs). Assuming a store and forward type of network transfers, our main o...
Padma Mundur, Sookyoung Lee, Matthew Seligman
171
Voted
CAISE
2010
Springer
15 years 5 months ago
Monitoring and Analyzing Service-Based Internet Systems through a Model-Aware Service Environment
Abstract As service-based Internet systems get increasingly complex they become harder to manage at design time as well as at runtime. Nowadays, many systems are described in terms...
Ta'id Holmes, Uwe Zdun, Florian Daniel, Schahram D...
PERSUASIVE
2010
Springer
15 years 3 months ago
Personality and Persuasive Technology: An Exploratory Study on Health-Promoting Mobile Applications
Though a variety of persuasive health applications have been designed with a preventive standpoint toward diseases in mind, many have been designed largely for a general audience. ...
Sajanee Halko, Julie A. Kientz
IEEEVAST
2010
14 years 11 months ago
Diamonds in the rough: Social media visual analytics for journalistic inquiry
Journalists increasingly turn to social media sources such as Facebook or Twitter to support their coverage of various news events. For large-scale events such as televised debate...
Nicholas Diakopoulos, Mor Naaman, Funda Kivran-Swa...