Sciweavers

679 search results - page 122 / 136
» What is disputed on the web
Sort
View
ETS
2000
IEEE
113views Hardware» more  ETS 2000»
13 years 7 months ago
NetChat: Communication and Collaboration via WWW
Practice has shown that providing content to students alone is not sufficient for good learning results. In computer based training (CBT) and especially webbased training (WBT) en...
Reinhard Kreutz, Sven Kiesow, Klaus Spitzer
TITB
2002
98views more  TITB 2002»
13 years 7 months ago
OILing the way to machine understandable bioinformatics resources
The complex questions and analyses posed by biologists, as well as the diverse data resources they develop, require the fusion of evidence from different, independently developed ...
Robert Stevens, Carole A. Goble, Ian Horrocks, Sea...
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
IDA
2011
Springer
13 years 2 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 11 months ago
Power management of online data-intensive services
Much of the success of the Internet services model can be attributed to the popularity of a class of workloads that we call Online Data-Intensive (OLDI) services. These workloads ...
David Meisner, Christopher M. Sadler, Luiz Andr&ea...