Sciweavers

25538 search results - page 5041 / 5108
» Explanation in Information Systems
Sort
View
HUC
2010
Springer
14 years 7 days ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
HUC
2010
Springer
14 years 7 days ago
Modeling people's place naming preferences in location sharing
Most location sharing applications display people's locations on a map. However, people use a rich variety of terms to refer to their locations, such as "home," &qu...
Jialiu Lin, Guang Xiang, Jason I. Hong, Norman M. ...
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
14 years 7 days ago
Managing team-based problem solving with symbiotic bid-based genetic programming
Bid-based Genetic Programming (GP) provides an elegant mechanism for facilitating cooperative problem decomposition without an a priori specification of the number of team member...
Peter Lichodzijewski, Malcolm I. Heywood
ACMDIS
2010
ACM
13 years 11 months ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
13 years 11 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
« Prev « First page 5041 / 5108 Last » Next »