Sciweavers

6240 search results - page 1146 / 1248
» From Internet Information Searching to Information Summarizi...
Sort
View
RECSYS
2009
ACM
15 years 8 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
SIGCOMM
2009
ACM
15 years 8 months ago
Opportunistic forwarding in workplaces
So far, the search for Opportunistic Network (ON) applications has focused on urban/rural scenarios where the combined use of mobility and the store-carry-and-forward paradigm hel...
Sabrina Gaito, Elena Pagani, Gian Paolo Rossi
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
15 years 8 months ago
Rethinking the Digital Divide: Towards a Path of Digital Effectiveness
The digital divide is a complex and dynamic phenomenon. Despite extensive studies on the digital divide and its impact, developing countries, in particular, are still searching fo...
Corlane Barclay, Evan W. Duggan
INFOCOM
2008
IEEE
15 years 8 months ago
Iso-Contour Queries and Gradient Descent with Guaranteed Delivery in Sensor Networks
—We study the problem of data-driven routing and navigation in a distributed sensor network over a continuous scalar field. Specifically, we address the problem of searching fo...
Rik Sarkar, Xianjin Zhu, Jie Gao, Leonidas J. Guib...
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 8 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
« Prev « First page 1146 / 1248 Last » Next »