Sciweavers

2913 search results - page 191 / 583
» How Much to Copy
Sort
View
102
Voted
P2P
2003
IEEE
100views Communications» more  P2P 2003»
15 years 6 months ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina
98
Voted
ISWC
2002
IEEE
15 years 5 months ago
Time and Time Again: Parallels in the Development of the Watch and the Wearable Computer
This paper examines the parallels in the development of the watch and the wearable computer. It discusses how the locations where the watch was worn on the body has changed over t...
Thomas L. Martin
86
Voted
TPHOL
2002
IEEE
15 years 5 months ago
Quotient Types: A Modular Approach
In this paper we introduce a new approach to axiomatizing quotient types in type theory. We suggest replacing the existing monolithic rule set by a modular set of rules for a speci...
Aleksey Nogin
104
Voted
MM
2009
ACM
178views Multimedia» more  MM 2009»
15 years 5 months ago
Automatic role recognition in multiparty recordings using social networks and probabilistic sequential models
The automatic analysis of social interactions is attracting significant interest in the multimedia community. This work addresses one of the most important aspects of the problem...
Sarah Favre, Alfred Dielmann, Alessandro Vinciarel...
110
Voted
HICSS
2000
IEEE
154views Biometrics» more  HICSS 2000»
15 years 5 months ago
Anti-Serendipity: Finding Useless Documents and Similar Documents
The problem of finding your way through a relatively unknown collection of digital documents can be daunting. Such collections sometimes have few categories and little hierarchy, ...
James W. Cooper, John M. Prager