Sciweavers

784 search results - page 51 / 157
» What would they think
Sort
View
CSREASAM
2006
13 years 9 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson
CHI
2010
ACM
14 years 2 months ago
Pico-ing into the future of mobile projector phones
Ten years ago we were on the verge of having cameras built into our mobile phones, but knew very little about what to expect or how they would be used. Now we are faced with the s...
Max L. Wilson, Simon Robinson, Dan Craggs, Kristia...
AGILEDC
2008
IEEE
14 years 2 months ago
The Good and Bad of Agile Offshore Development
Companies today are attempting to lower costs and increase their staffing flexibility by taking some [or even all] of their development activities overseas. Simultaneously, many o...
Mike Cottmeyer
ISIP
2008
IEEE
14 years 2 months ago
An Approach Towards the Integration of Adaptive Business Intelligent and Constraint Programming
Adaptive Business Intelligence is the discipline that combines prediction, optimization and adaptability into a system answering two important questions: What would probably happe...
José Miguel Rubio, Broderick Crawford
AH
2008
Springer
14 years 2 months ago
Modelling Semantic Relationships and Centrality to Facilitate Community Knowledge Sharing
Some of today’s most widely spread applications are social systems where people can form communities and share knowledge. However, knowledge sharing is not always effective and c...
Styliani Kleanthous, Vania Dimitrova