Sciweavers

1498 search results - page 292 / 300
» Network control as a distributed object application
Sort
View
RECSYS
2009
ACM
15 years 4 months ago
An incentive-based architecture for social recommendations
We present an incentive-based architecture for providing recommendations in a social network. We maintain a distinct reputation system for each individual and we rely on users to ...
Rajat Bhattacharjee, Ashish Goel, Konstantinos Kol...
WOWMOM
2005
ACM
109views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
A High-Throughput MAC Strategy for Next-Generation WLANs
WLAN technology has been shown a revolutionary development during the last decade. Recently popularized IEEE 802.11a/gbased products can support up to 54 Mbps PHY (Physical layer)...
Seongkwan Kim, Youngsoo Kim, Sunghyun Choi, Kyungh...
HT
2004
ACM
15 years 3 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
CIKM
2005
Springer
15 years 3 months ago
Focused crawling for both topical relevance and quality of medical information
Subject-specific search facilities on health sites are usually built using manual inclusion and exclusion rules. These can be expensive to maintain and often provide incomplete c...
Thanh Tin Tang, David Hawking, Nick Craswell, Kath...
DAC
1997
ACM
15 years 2 months ago
More Practical Bounded-Skew Clock Routing
: Academic clock routing research results has often had limited impact on industry practice, since such practical considerations as hierarchical buffering, rise-time and overshoot ...
Andrew B. Kahng, Chung-Wen Albert Tsao