Sciweavers

9785 search results - page 1798 / 1957
» Open Agent Systems
Sort
View
SIGIR
2009
ACM
15 years 12 months ago
Detecting spammers and content promoters in online video social networks
A number of online video social networks, out of which YouTube is the most popular, provides features that allow users to post a video as a response to a discussion topic. These f...
Fabrício Benevenuto, Tiago Rodrigues, Virg&...
IEEESCC
2007
IEEE
15 years 11 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
174
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
EUC
2007
Springer
15 years 11 months ago
Palpability Support Demonstrated
Abstract. In ubiquitous computing, as more and more devices are embedded into the environment, there is a risk that the user loses the understanding of the system. In normal use th...
Jeppe Brønsted, Erik Grönvall, David F...
GECCO
2007
Springer
183views Optimization» more  GECCO 2007»
15 years 11 months ago
Screening the parameters affecting heuristic performance
This research screens the tuning parameters of a combinatorial optimization heuristic. Specifically, it presents a Design of Experiments (DOE) approach that uses a Fractional Fac...
Enda Ridge, Daniel Kudenko
« Prev « First page 1798 / 1957 Last » Next »