Sciweavers

2244 search results - page 254 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
109
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
88
Voted
CHI
2005
ACM
16 years 28 days ago
Acceptance and usability of a relational agent interface by urban older adults
This study examines the acceptance and usability of an animated conversational agent designed to establish longterm relationships with older, mostly minority adult users living in...
Timothy W. Bickmore, Lisa Caruso, Kerri Clough-Gor...
115
Voted
IJIPT
2008
191views more  IJIPT 2008»
15 years 16 days ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah
115
Voted
MM
2004
ACM
157views Multimedia» more  MM 2004»
15 years 6 months ago
Everyday cinema
Stories make our experiences memorable over time. In constructing and sharing our personal and communal memories, we move in a reflective manner back and forth between our lifewor...
Aisling Kelliher
VISSYM
2007
15 years 2 months ago
TrustNeighborhoods: Visualizing Trust in Distributed File Sharing Systems
We present TrustNeighborhoods, a security trust visualization for situational awareness on the Internet aimed at novice and intermediate users of a distributed file sharing system...
Niklas Elmqvist, Philippas Tsigas