Sciweavers

826 search results - page 26 / 166
» What Triggers a Behavior
Sort
View
93
Voted
CSCW
2006
ACM
15 years 6 months ago
What goes around comes around: an analysis of del.icio.us as social space
An emergent class of web applications blurs the boundary between single user application and online public space. Recently popular web applications like del.icio.us help manage in...
Kathy J. Lee
CHI
2000
ACM
15 years 5 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...
CONEXT
2007
ACM
15 years 4 months ago
Do you know what you are generating?
Software-based traffic generators are commonly used in experimental research on computer networks. However, there are no much studies focusing on how such instruments are accurate...
Alberto Dainotti, Alessio Botta, Antonio Pescap&eg...
96
Voted
ICASSP
2009
IEEE
15 years 4 months ago
What happens when cognitive terminals compete for a relaying node?
We introduce a new channel, which consists of an interference channel (IC) in parallel with an interference relay channel (IRC), to analyze the interaction between two selfish and...
Elena Veronica Belmega, Brice Djeumou, Samson Lasa...
PST
2008
15 years 2 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood