Sciweavers

2492 search results - page 440 / 499
» False-Name-Proofness in Social Networks
Sort
View
ATAL
2003
Springer
14 years 3 months ago
Detecting deception in reputation management
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
Bin Yu, Munindar P. Singh
HASE
2002
IEEE
14 years 3 months ago
The Concept and Practice of Software Quality Assurance in Japan in the Global Era
The Japanese computer industry in 1990s was hit with two major shocks at the same time. One shock was the drastic reform of computers and of network. The other shock was from the ...
Katsuyuki Yasuda, Shigeru Yamada
WMTE
2002
IEEE
14 years 3 months ago
Environmental Detectives: PDAs as a Window into a Virtual Simulated World
The use of computer simulations is changing the nature of scientific investigation and providing us unique insights into the way that the world works. As simulation moves from the...
Eric Klopfer, Kurt Squire, Henry Jenkins
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
14 years 3 months ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...
HUC
2009
Springer
14 years 2 months ago
Ubicomp4D: infrastructure and interaction for international development--the case of urban indian slums
This paper attempts to re-imagine ubiquitous computing for populations in low-income and information-challenged environments. We examine information infrastructures in midsized ur...
Nithya Sambasivan, Nimmi Rangaswamy, Ed Cutrell, B...