Sciweavers

1203 search results - page 171 / 241
» A Reference Model for a Networked Organization
Sort
View
102
Voted
MOBISYS
2004
ACM
16 years 6 days ago
Implementing Software on Resource-Constrained Mobile Sensors: Experiences with Impala and ZebraNet
ZebraNet is a mobile, wireless sensor network in which nodes move throughout an environment working to gather and process information about their surroundings [10]. As in many sen...
Ting Liu, Christopher M. Sadler, Pei Zhang, Margar...
128
Voted
CHI
2011
ACM
14 years 4 months ago
Identifying social capital in the facebook interface
A number of studies have identified a robust relationship between the use of social network sites, particularly Facebook, and positive outcomes such as social capital. Social netw...
Christian Yoder, Fred Stutzman
96
Voted
WECWIS
2009
IEEE
104views ECommerce» more  WECWIS 2009»
15 years 7 months ago
Online Auctions: There Can Be Only One
—In recent years, the proliferation of the world wide web has lead to an increase in the number of public auctions on the internet. One of the characteristics of online auctions ...
Charu C. Aggarwal, Philip S. Yu
78
Voted
LCN
2007
IEEE
15 years 7 months ago
A Simulation Study of Multi-Color Marking of TCP Aggregates
— Service Level Agreements (SLAs) are contracts signed between a provider and a customer to govern the amount of traffic that will be serviced. This work pinpoints an important ...
Miriam Allalouf, Yuval Shavitt
117
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto