Sciweavers

881 search results - page 126 / 177
» The Use of Scientific Data: A Content Analysis
Sort
View
82
Voted
CCS
2005
ACM
15 years 4 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
SIGGRAPH
1993
ACM
15 years 3 months ago
Surround-screen projection-based virtual reality: the design and implementation of the CAVE
Several common systems satisfy some but not all of the VR definition above. Flight simulators provide vehicle tracking, not head tracking, and do not generally operate in binocular...
Carolina Cruz-Neira, Daniel J. Sandin, Thomas A. D...
WWW
2007
ACM
15 years 11 months ago
P-TAG: large scale automatic generation of personalized annotation tags for the web
The success of the Semantic Web depends on the availability of Web pages annotated with metadata. Free form metadata or tags, as used in social bookmarking and folksonomies, have ...
Paul-Alexandru Chirita, Stefania Costache, Wolfgan...
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
15 years 5 months ago
Can Peer-to-Peer Networks Facilitate Information Sharing in Collaborative Learning?
Many peer-to-peer (P2P) networks have been widely used for file sharing. A peer acts both as a content provider and a consumer, and is granted autonomy to decide what content, wit...
Fu-ren Lin, Sheng-cheng Lin, Ying-fen Wang
110
Voted
LWA
2007
15 years 10 days ago
Know the Right People? Recommender Systems for Web 2.0
Web 2.0 applications like Flickr, YouTube, or Del.icio.us are increasingly popular online communities for creating, editing and sharing content. However, the rapid increase in siz...
Stefan Siersdorfer, Sergej Sizov, Paul Clough