Sciweavers

1265 search results - page 95 / 253
» Computer poker: A review
Sort
View
CHI
2004
ACM
15 years 10 months ago
Forecasting presence and availability
We present methods employed in COORDINATE, a prototype service that supports collaboration and communication by learning predictive models that provide forecasts of users' pr...
Joe Tullio, James Begole, Eric Horvitz, Elizabeth ...
DCC
2007
IEEE
15 years 9 months ago
Golay complementary array pairs
Constructions and nonexistence conditions for multi-dimensional Golay complementary array pairs are reviewed. A construction for a d-dimensional Golay array pair from a (d + 1)-di...
Jonathan Jedwab, Matthew G. Parker
ICDCSW
2008
IEEE
15 years 4 months ago
Heuristic Relay Node Selection Algorithm for One-Hop Overlay Routing
—This paper reviews the characteristics of overlay networks and defines effective relay nodes that can improve the performance of interactive real-time applications. A heuristic ...
Yin Chen, Li Tang, Jun Li
ICDCSW
2007
IEEE
15 years 4 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
VL
2007
IEEE
166views Visual Languages» more  VL 2007»
15 years 4 months ago
Community-Based Scaffolding to Promote End-User Learning
End-user programming provides a unique opportunity to study informal computer science education and knowledge acquisition in the real world. We seek to explore the use of communit...
Brian Dorn