Sciweavers

18374 search results - page 3544 / 3675
» Applications for data hiding
Sort
View
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 4 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
APGV
2006
ACM
181views Visualization» more  APGV 2006»
14 years 4 months ago
Categorization of natural scenes: local vs. global information
Understanding the robustness and rapidness of human scene categorization has been a focus of investigation in the cognitive sciences over the last decades. At the same time, progr...
Julia Vogel, Adrian Schwaninger, Christian Wallrav...
ASPLOS
2006
ACM
14 years 4 months ago
AVIO: detecting atomicity violations via access interleaving invariants
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detect...
Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
CSCW
2006
ACM
14 years 4 months ago
AwareMedia: a shared interactive display supporting social, temporal, and spatial awareness in surgery
Several CSCW studies have shown that coordination of work in hospitals is particular challenging, and that clinicians put much effort into maintaining mutual awareness on the flo...
Jakob E. Bardram, Thomas Riisgaard Hansen, Mads S&...
HT
2006
ACM
14 years 4 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
« Prev « First page 3544 / 3675 Last » Next »