Sciweavers

5246 search results - page 880 / 1050
» Sanitization models and their limitations
Sort
View
IJHCI
2010
117views more  IJHCI 2010»
14 years 8 months ago
Avoiding Latent Design Conditions Using UI Discovery Tools
Motivation – Designers make decisions that later influence how users work with the systems that they have designed. When errors occur in use, it is tempting to focus on the acti...
Harold W. Thimbleby
83
Voted
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
14 years 8 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...
INFOCOM
2010
IEEE
14 years 8 months ago
Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks
Abstract—Spectrum sensing is one of the key enabling technologies in Cognitive Radio Networks (CRNs). In CRNs, secondary users (SUs) are allowed to exploit the spectrum opportuni...
Yanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni
INFOCOM
2010
IEEE
14 years 8 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
80
Voted
ISEM
2010
105views more  ISEM 2010»
14 years 8 months ago
A roadmap to adopting emerging technology in e-business: an empirical study
This study explores the firm’s readiness for developing emerging technology in e−business. By proposing a framework that captures technological, financial, and human capabilit...
Hsin-Lu Chang