Sciweavers

Share
JUCS
2008
166views more  JUCS 2008»
9 years 10 months ago
Exposure and Support of Latent Social Networks among Learning Object Repository Users
Abstract: Although immense efforts have been invested in the construction of hundreds of learning object repositories, the degree of reuse of learning resources maintained in such ...
Peng Han, Gerd Kortemeyer, Bernd J. Krämer, C...
JUCS
2008
108views more  JUCS 2008»
9 years 10 months ago
Supporting Informal Collaboration in Shared-Workspace Groupware
Shared-workspace groupware has not become common in the workplace, despite many positive results from the research lab. One reason for this lack of success is that most shared work...
Carl Gutwin, Saul Greenberg, Roger Blum, Jeff Dyck...
JUCS
2008
118views more  JUCS 2008»
9 years 10 months ago
Enhancements of Meeting Information Management and Application for Knowledge Access and Learning Activities
: Communication processes have become increasingly important in modern working life. Organizations invest a surprisingly high amount of financial resources and employee work time i...
Christian Gütl
JUCS
2008
116views more  JUCS 2008»
9 years 10 months ago
Comparative Aspects between the Cluster and Grid Implementations of BigBatch
: BigBatch is an image processing environment designed to process batches of thousands of monochromatic documents. One of the flexibilities and pioneer aspects of BigBatch is offer...
Giorgia de Oliveira Mattos, Andrei de Araúj...
JUCS
2008
137views more  JUCS 2008»
9 years 10 months ago
The Trade-Offs of Blending Synchronous and Asynchronous Communication Services to Support Contextual Collaboration
: Contextual collaboration seamlessly integrates existing groupware technologies into a uniform user experience that combines synchronous and asynchronous interactions. This user e...
Werner Geyer, Roberto Silveira Silva Filho, Beth B...
JUCS
2008
143views more  JUCS 2008»
9 years 10 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
JUCS
2008
101views more  JUCS 2008»
9 years 10 months ago
Quo Vadis Abstract State Machines?
Egon Börger, Andreas Prinz
JUCS
2008
166views more  JUCS 2008»
9 years 10 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
JUCS
2008
157views more  JUCS 2008»
9 years 10 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
JUCS
2008
90views more  JUCS 2008»
9 years 10 months ago
A Survey of Practical Software Adaptation Techniques
: Software adaptation techniques appear in many disparate areas of research literature, and under many guises. This paper enables a clear and uniform understanding of the related r...
Stephen Kell
books