Sciweavers

811 search results - page 73 / 163
» When Novelty Is Not Enough
Sort
View
CSE
2009
IEEE
14 years 4 months ago
How Did You Get to Know That? A Traceable Word-of-Mouth Algorithm
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as ...
Manuel Cebrián, Enrique Frías-Mart&i...
ICALT
2009
IEEE
14 years 4 months ago
Learning Activity Spaces: Towards Flexibility in Learning Design?
Designing a computer-supported learning scenario involving a constructivist approach of learning lays on a paradox. On the one hand, learning flows must be precisely described –...
Anne Lejeune, Muriel Ney, Armin Weinberger, Margus...
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
14 years 4 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
ICEIS
2009
IEEE
14 years 4 months ago
CrimsonHex: A Service Oriented Repository of Specialised Learning Objects
The corner stone of the interoperability of eLearning systems is the standard definition of learning objects. Nevertheless, for some domains this standard is insufficient to fully ...
José Paulo Leal, Ricardo Queirós
UIC
2009
Springer
14 years 4 months ago
Printing in Ubiquitous Computing Environments
Document printing has long been considered an indispensable part of the workspace. While this process is considered trivial and simple for environments where resources are ample (e...
Athanasios Karapantelakis, Alisa Devlic, Mohammad ...