Designing CSCW systems that support the widely varying needs of targeted users is difficult. There is no silver bullet technology that enables users to effectively collaborate wit...
Will Humphries, D. Scott McCrickard, Dennis C. Nea...
All books entitled “Learn … with 1000 exercises” have in common the same basic principle. They aim to supply enough material to students so that they may better understand t...
Enrique Lazcorreta, Federico Botella, Antonio Fern...
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
Flood control for reservoirs require operations in a dynamic and cooperative manner in order to respond to the changing flood control conditions. There is an increasing emphasis on...
Chuntian Cheng, Kwok-wing Chau, Gang Li, Xiang-Yan...
In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. Like other distributed trust management sy...