Sciweavers

6240 search results - page 1090 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
129
Voted
HICSS
2006
IEEE
128views Biometrics» more  HICSS 2006»
15 years 7 months ago
Examining the Cognitive Style Effects on the Acceptance of Online Community Weblog Systems
Weblog is increasingly important over time with researchers anxious to learn why millions of Internet users are so eager to post their own diary on the web everyday. This study co...
Will Wai-Kit Ma, Pu Li, Theodore H. K. Clark
ICDCS
2006
IEEE
15 years 7 months ago
Fast data access over asymmetric channels using fair and secure bandwidth sharing
We propose a peer-to-peer architecture designed to overcome asymmetries in upload/download speeds that are typical in end-user dialup, broadband and cellular wireless Internet con...
Sachin Agarwal, Moshe Laifenfeld, Ari Trachtenberg...
107
Voted
CCGRID
2005
IEEE
15 years 7 months ago
Logistical multicast for data distribution
This paper describes a simple scheduling procedure for use in multicast data distribution within a logistical networking infrastructure. The goal of our scheduler is to generate a...
Jason Zurawski, D. Martin Swany, Micah Beck, Ying ...
SAC
2005
ACM
15 years 7 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar usersā...
Huseyin Polat, Wenliang Du
DRMTICS
2005
Springer
15 years 7 months ago
Algorithms to Watermark Software Through Register Allocation
Software security is a significant issue in the Internet age. In order to prevent software from piracy and unauthorized modification, many techniques have been developed. Softwar...
William Zhu, Clark D. Thomborson
« Prev « First page 1090 / 1248 Last » Next »