Sciweavers

1791 search results - page 178 / 359
» Behavioral Operations
Sort
View
ECSCW
2007
15 years 5 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi
NIPS
2007
15 years 5 months ago
On higher-order perceptron algorithms
A new algorithm for on-line learning linear-threshold functions is proposed which efficiently combines second-order statistics about the data with the ”logarithmic behavior” ...
Claudio Gentile, Fabio Vitale, Cristian Brotto
DAGSTUHL
2006
15 years 5 months ago
On the Topologies Formed by Selfish Peers
Current peer-to-peer (P2P) systems often suffer from a large fraction of freeriders not contributing any resources to the network. Various mechanisms have been designed to overcom...
Stefan Schmid, Thomas Moscibroda, Roger Wattenhofe...
133
Voted
ICWN
2004
15 years 5 months ago
Sustaining Performance Under Traffic Overload
In this paper, we investigate the performance of wireless ad hoc networks with traffic loads beyond saturation. While it is desirable to operate a network below saturation, an ad h...
Saman Desilva, Rajendra V. Boppana
135
Voted
IIWAS
2004
15 years 5 months ago
Identifying Keywords to Improve a Web Site Text Content
The steadily increasing competition of internet web sites makes it both more difficult and more important to attract and retain users. However, it is not always possible to determ...
Juan D. Velásquez, Sebastián A. R&ia...