Sciweavers

1845 search results - page 213 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
WWW
2008
ACM
16 years 2 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
110
Voted
OTM
2005
Springer
15 years 7 months ago
Timely Provisioning of Mobile Services in Critical Pervasive Environments
Timeliness in conventional real-time systems is addressed by employing well-known scheduling techniques that guarantee the execution of a number of tasks within certain deadlines. ...
Filippos Papadopoulos, Apostolos Zarras, Evaggelia...
CSCW
2012
ACM
13 years 9 months ago
Blogs as a collective war diary
Disaster-related research in human-centered computing has typically focused on the shorter-term, emergency period of a disaster event, whereas effects of some crises are longterm,...
Gloria Mark, Mossaab Bagdouri, Leysia Palen, James...
WWW
2009
ACM
16 years 2 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...
WWW
2002
ACM
16 years 2 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell