Sciweavers

2309 search results - page 324 / 462
» Patterns for Technology Companies
Sort
View
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
15 years 9 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
126
Voted
CHI
1996
ACM
15 years 9 months ago
Gratuitous Graphics? Putting Preferences in Perspective
Rapid growth in 3-D rendering technologies has deluged us with glitzy graphical representations. In what contexts do people find 3-D graphs of 2-D data both attractive and useful?...
Ellen Levy, Jeff Zacks, Barbara Tversky, Diane J. ...
AIRWEB
2007
Springer
15 years 9 months ago
Measuring Similarity to Detect Qualified Links
The early success of link-based ranking algorithms was predicated on the assumption that links imply merit of the target pages. However, today many links exist for purposes other ...
Xiaoguang Qi, Lan Nie, Brian D. Davison
CANDT
2009
15 years 8 months ago
Analyzing (social media) networks with NodeXL
We present NodeXL, an extendible toolkit for network overview, discovery and exploration implemented as an add-in to the Microsoft Excel 2007 spreadsheet software. We demonstrate ...
Marc A. Smith, Ben Shneiderman, Natasa Milic-Frayl...
PETRA
2010
ACM
15 years 8 months ago
Context-aware optimized information dissemination in large scale vehicular networks
Context-aware inter-vehicular communication is considered to be vital for inducing intelligence through the use of embedded computing devices inside vehicles. Vehicles in a scalab...
Yves Vanrompay, Ansar-Ul-Haque Yasar, Davy Preuven...