Sciweavers

1479 search results - page 64 / 296
» Extremal collective behavior
Sort
View
CIKM
2003
Springer
15 years 5 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber
ACSAC
2005
IEEE
15 years 5 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
CSCW
2004
ACM
15 years 5 months ago
Influencing group participation with a shared display
During face-to-face interactions, groups frequently overly rely on the dominant viewpoint to lead the group in its decision-making process. We begin with a discussion of this phen...
Joan Morris DiMicco, Anna Pandolfo, Walter Bender
ICSOC
2010
Springer
14 years 10 months ago
Service Discovery Using Communication Fingerprints
A request to a service registry must be answered with a service that fits in several regards, including semantic compatibility, non-functional compatibility, and interface compati...
Olivia Oanea, Jan Sürmeli, Karsten Wolf
IJNVO
2011
47views more  IJNVO 2011»
14 years 6 months ago
Harvesting covert networks: a case study of the iMiner database
: Data collection of covert networks is an inherently difficult task because of the very nature of these networks. Researchers find it difficult to locate and access data relating ...
Nasrullah Memon, Uffe Kock Wiil, Reda Alhajj, Clau...