Sciweavers

4445 search results - page 791 / 889
» Reflective Authorization Systems
Sort
View
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
15 years 3 months ago
Efficacy and Sustainability of a Telerehabilitation Program
Efficacy and Sustainability of a Telerehabilitation Program Sustainability and appropriateness of care are important components for healthcare systems as they begin integrating te...
Cynthia Scheideman-Miller, Pamela G. Clark, Al Moo...
ITCC
2003
IEEE
15 years 3 months ago
A Method for Calculating Term Similarity on Large Document Collections
We present an efficient algorithm called the Quadtree Heuristic for identifying a list of similar terms for each unique term in a large document collection. Term similarity is de...
Wolfgang W. Bein, Jeffrey S. Coombs, Kazem Taghva
ERLANG
2003
ACM
15 years 3 months ago
Evaluating distributed functional languages for telecommunications software
The distributed telecommunications sector not only requires minimal time to market, but also software that is reliable, available, maintainable and scalable. High level programmin...
Jan Henry Nyström, Philip W. Trinder, David J...
CSCW
2010
ACM
15 years 3 months ago
Sending mixed signals: multilevel reputation effects in peer-to-peer lending markets
Online peer-to-peer (P2P) lending organizations enable an individual to obtain an unsecured loan from a collection of individuals without the participation of a bank. Previous res...
Benjamin C. Collier, Robert Hampshire
AINA
2010
IEEE
15 years 3 months ago
Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the Road
— Today’s vehicles and on-road infrastructures are equipped with a large number of sophisticated sensory devices. These sensory devices are capable of monitoring and providing ...
Flora Dilys Salim