Sciweavers

8770 search results - page 1557 / 1754
» Named Service Networking
Sort
View
CSCW
2012
ACM
13 years 7 months ago
Removing gamification from an enterprise SNS
Gamification, the use of game mechanics in non-gaming applications, has been applied to various systems to encourage desired user behaviors. In this paper, we examine patterns of ...
Jennifer Thom-Santelli, David R. Millen, Joan Morr...
PAM
2012
Springer
13 years 7 months ago
A Longitudinal Characterization of Local and Global BitTorrent Workload Dynamics
Abstract. Workload characterization is important for understanding how systems and services are used in practice and to help identify design improvements. To better understand the ...
Niklas Carlsson, György Dán, Anirban M...
ACL
2012
13 years 1 months ago
Social Event Radar: A Bilingual Context Mining and Sentiment Analysis Summarization System
Social Event Radar is a new social networking-based service platform, that aim to alert as well as monitor any merchandise flaws, food-safety related issues, unexpected eruption o...
Wen-Tai Hsieh, Chen Ming Wu, Tsun Ku, Seng-cho Tim...
ANCS
2009
ACM
14 years 9 months ago
LaFA: lookahead finite automata for scalable regular expression detection
Although Regular Expressions (RegExes) have been widely used in network security applications, their inherent complexity often limits the total number of RegExes that can be detec...
Masanori Bando, N. Sertac Artan, H. Jonathan Chao
MOBISYS
2008
ACM
15 years 11 months ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
« Prev « First page 1557 / 1754 Last » Next »