Sciweavers

2244 search results - page 280 / 449
» Subjective Document Classification Using Network Analysis
Sort
View
112
Voted
CCS
2007
ACM
15 years 6 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
ACMACE
2004
ACM
15 years 5 months ago
A synthetic traffic model for Quake3
This paper presents our development of a synthetic traffic model for the interactive online computer game Quake3. The goal is a traffic model that can be used by researchers and I...
Tanja Lang, Philip Branch, Grenville J. Armitage
MOBICOM
2006
ACM
15 years 6 months ago
On the complexity of scheduling in wireless networks
We consider the problem of throughput-optimal scheduling in wireless networks subject to interference constraints. We model the interference using a family of K-hop interference m...
Gaurav Sharma, Ravi R. Mazumdar, Ness B. Shroff
SIGDOC
2005
ACM
15 years 6 months ago
Sensorium games: usability considerations for pervasive gaming
The Sensorium family of games provides a platform and environment for multiplayer games in a pervasive environment. Each player is equipped with a mote, which (along with those of...
S. N. I. Mount, Elena I. Gaura, Robert M. Newman
101
Voted
KDD
2005
ACM
171views Data Mining» more  KDD 2005»
16 years 26 days ago
Deriving marketing intelligence from online discussion
Weblogs and message boards provide online forums for discussion that record the voice of the public. Woven into this mass of discussion is a wide range of opinion and commentary a...
Natalie S. Glance, Matthew Hurst, Kamal Nigam, Mat...