Sciweavers

2492 search results - page 458 / 499
» False-Name-Proofness in Social Networks
Sort
View
SEMCO
2007
IEEE
14 years 4 months ago
Lexical and Discourse Analysis of Online Chat Dialog
One of the ultimate goals of natural language processing (NLP) systems is understanding the meaning of what is being transmitted, irrespective of the medium (e.g., written versus ...
Eric N. Forsythand, Craig H. Martell
MABS
2007
Springer
14 years 4 months ago
Trust-Based Inter-temporal Decision Making: Emergence of Altruism in a Simulated Society
This paper contributes to the analysis of the question how altruistic behaviour can be in an agent’s own interest. The question is addressed by involving a temporal dimension in ...
Tibor Bosse, Martijn C. Schut, Jan Treur, David We...
OTM
2007
Springer
14 years 4 months ago
Spontaneous Privacy Policy Negotiations in Pervasive Environments
Abstract. Privacy issues are a major burden for the acceptance of pervasive applications. They may ultimately result in the rejection of new services despite their functional beneï...
Sören Preibusch
VLDB
2007
ACM
96views Database» more  VLDB 2007»
14 years 4 months ago
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
Privacy is an important issue in data publishing. Many organizations distribute non-aggregate personal data for research, and they must take steps to ensure that an adversary cann...
Bee-Chung Chen, Raghu Ramakrishnan, Kristen LeFevr...
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 4 months ago
Core and Periphery in Free/Libre and Open Source Software Team Communications
The concept of the core group of developers is important and often discussed in empirical studies of FLOSS projects. This paper examines the question, “how does one empirically ...
Kevin Crowston, Kangning Wei, Qing Li, James Howis...