Sciweavers

232 search results - page 13 / 47
» Why use computers to make drawings
Sort
View
ICDCSW
2007
IEEE
14 years 3 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
CHI
2007
ACM
14 years 19 days ago
A familiar face(book): profile elements as signals in an online social network
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, gi...
Cliff Lampe, Nicole Ellison, Charles Steinfield

Publication
383views
15 years 9 months ago
The Cathedral and the Bazaar
Ever wondered why open source finally yields products that work? Eric Raymod discusses that in this paper using the bazaar as a metaphor for open source hacker developed software t...
Eric Raymond
CHI
1998
ACM
14 years 27 days ago
Information Archiving with Bookmarks: Personal Web Space Construction and Organization
Bookmarks are used as "personal Web information spaces" to help people remember and retrieve interesting Web pages. A study of personal Web information spaces surveyed 3...
David Abrams, Ronald Baecker, Mark H. Chignell
IEEECIT
2010
IEEE
13 years 6 months ago
The Research on Teaching Method of Basics Course of Computer based on Cluster Analysis
Due to the difference between rural and urban and regional disparity of computer basic education produced at their middle school period, computer application level of the freshmen ...
ZhiXin Tie, Rong Jin, Hong Zhuang, Zhaoqing Wang