Sciweavers

192 search results - page 14 / 39
» Who gets spammed
Sort
View
CHI
2002
ACM
14 years 7 months ago
Head orientation and gaze direction in meetings
Detecting who is looking at whom during multiparty interaction is useful for various tasks such as meeting analysis. There are two contributing factors in the formation of where a...
Rainer Stiefelhagen, Jie Zhu
ISESE
2006
IEEE
14 years 1 months ago
Analysis of the influence of communication between researchers on experiment replication
The replication of experiments is a key undertaking in SE. Successful replications enable a discipline’s body of knowledge to grow, as the results are added to those of earlier ...
Sira Vegas, Natalia Juristo Juzgado, Ana Mar&iacut...
NETGAMES
2005
ACM
14 years 1 months ago
A challenge for reusing multiplayer online games without modifying binaries
In this paper, we advocate the problem of reusing Multiplayer Online Game (MOG) in Client-Server (C/S) architecture. The problem is that MOG services cannot continue to be provide...
Yugo Kaneda, Hitomi Takahashi, Masato Saito, Hirot...
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 7 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
ESWS
2011
Springer
12 years 11 months ago
The Use of Foundational Ontologies in Ontology Development: An Empirical Assessment
There is an assumption that ontology developers will use a top-down approach by using a foundational ontology, because it purportedly speeds up ontology development and improves qu...
C. Maria Keet