Sciweavers

1443 search results - page 118 / 289
» Aging Users are Still Users
Sort
View
104
Voted
WMASH
2004
ACM
15 years 6 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
83
Voted
MFCS
2004
Springer
15 years 6 months ago
The Price of Anarchy for Polynomial Social Cost
Abstract. In this work, we consider an interesting variant of the wellstudied KP model [18] for selfish routing that reflects some influence from the much older Wardrop model [3...
Martin Gairing, Thomas Lücking, Marios Mavron...
82
Voted
ITCC
2003
IEEE
15 years 6 months ago
Simplified Authoring for Instructors using Distance Education (SAIDE)
This paper presents an alternative to current authoring methods for use in distance education. Several commercially available distanceeducation authoring tools are briefly discuss...
James Garvin, Eric Alsheimer, Zak Bradshaw, Peter ...
IPTPS
2003
Springer
15 years 6 months ago
Rationality and Self-Interest in Peer to Peer Networks
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user’s ability to modify ...
Jeffrey Shneidman, David C. Parkes
106
Voted
ESWS
2010
Springer
15 years 5 months ago
Facet Graphs: Complex Semantic Querying Made Easy
While the Semantic Web is rapidly filling up, appropriate tools for searching it are still at infancy. In this paper we describe an approach that allows humans to access informatio...
Philipp Heim, Thomas Ertl, Jürgen Ziegler