Sciweavers

1167 search results - page 187 / 234
» Networking Aspects for Gaming Systems
Sort
View
SEC
2007
14 years 11 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
CRIWG
2003
14 years 11 months ago
An Agent Framework to Support Opportunistic Collaboration
In increasingly networked times, CSCW systems have become more common. In most of these, individuals work collaboratively from their personal computer terminals, unaware of their p...
Melfry Moreno, Adriana Santarosa Vivacqua, Jano Mo...
IJCAI
2003
14 years 11 months ago
Concept Linking for Information Integration in Open Book and Sentinel
Opening up large amounts of loosely structured information for easy access and use is a complex problem. This paper describes two systems that address different aspects of the pro...
Stuart Watt
BIB
2007
99views more  BIB 2007»
14 years 10 months ago
Towards a calculus of biomolecular complexes at equilibrium
An overview is presented of the construction and use of algebraic partition functions to represent the equilibrium statistical mechanics of multimolecular complexes and their acti...
Eric Mjolsness
JNW
2006
145views more  JNW 2006»
14 years 9 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman