Sciweavers

1818 search results - page 217 / 364
» How users use access control
Sort
View
VR
2010
IEEE
154views Virtual Reality» more  VR 2010»
15 years 3 months ago
On error bound estimation for motion prediction
A collaborative virtual environment (CVE) allows remote users to access and modify shared data through networks, such as the Internet. However, when the users are connected via th...
Rynson W. H. Lau, Kenneth Lee
131
Voted
INFOCOM
2005
IEEE
15 years 10 months ago
Economics of network pricing with multiple ISPs
Abstract—In this paper we examine how transit and customer prices are set in a network consisting of multiple ISPs. Some ISPs may be geographically co-located so that they compet...
Sanjay Shakkottai, R. Srikant
ICDE
2003
IEEE
157views Database» more  ICDE 2003»
16 years 6 months ago
Energy Efficient Index for Querying Location-Dependent Data in Mobile Broadcast Environments
We are witnessing in recent years growing interest for location-dependent information services among mobile users. This paper examines the issue of processing locationdependent qu...
Jianliang Xu, Baihua Zheng, Wang-Chien Lee, Dik Lu...
114
Voted
RECSYS
2009
ACM
15 years 9 months ago
Acceptance issues of personality-based recommender systems
To understand users’ acceptance of the emerging trend of personality-based recommenders (PBR), we evaluated an existing PBR using the technology acceptance model (TAM). We also ...
Rong Hu, Pearl Pu
129
Voted
APWEB
2010
Springer
15 years 10 months ago
Crawling Online Social Graphs
—Extensive research has been conducted on top of online social networks (OSNs), while little attention has been paid to the data collection process. Due to the large scale of OSN...
Shaozhi Ye, Juan Lang, Shyhtsun Felix Wu