Sciweavers

1458 search results - page 289 / 292
» Extended Term Rewriting Systems
Sort
View
EJIS
2008
47views more  EJIS 2008»
13 years 7 months ago
The effect of flaming on computer-mediated negotiations
There is an increasing use of computer media for negotiations. However, the use of computer-mediated channels increases the hostile expressions of emotion, termed flaming. Althoug...
Norman A. Johnson, Randolph B. Cooper, Wynne W. Ch...
ESWA
2008
140views more  ESWA 2008»
13 years 7 months ago
Web taxonomy integration with hierarchical shrinkage algorithm and fine-grained relations
We address the problem of integrating web taxonomies from different real Internet applications. Integrating web taxonomies is to transfer instances from a source to target taxonom...
Chia-Wei Wu, Richard Tzong-Han Tsai, Cheng-Wei Lee...
JUCS
2008
156views more  JUCS 2008»
13 years 7 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGIR
2008
ACM
13 years 7 months ago
A simple and efficient sampling method for estimating AP and NDCG
We consider the problem of large scale retrieval evaluation. Recently two methods based on random sampling were proposed as a solution to the extensive effort required to judge te...
Emine Yilmaz, Evangelos Kanoulas, Javed A. Aslam