Sciweavers

2492 search results - page 460 / 499
» False-Name-Proofness in Social Networks
Sort
View
TRIDENTCOM
2005
IEEE
14 years 3 months ago
A Testbed for Evaluating Human Interaction with Ubiquitous Computing Environments
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...
KNINVI
2005
Springer
14 years 3 months ago
Representational Correspondence as a Basic Principle of Diagram Design
The timeworn claim that a picture is worth a thousand words is generally well-supported by empirical evidence, suggesting that diagrams and other information graphics can enhance h...
Christopher F. Chabris, Stephen M. Kosslyn
WINE
2005
Springer
109views Economy» more  WINE 2005»
14 years 3 months ago
New Algorithms for Mining the Reputation of Participants of Online Auctions
The assessment of credibility and reputation of contractors in online auctions is the key issue in providing reliable environment for customer-to-customer e-commerce. Confident re...
Mikolaj Morzy
WSTST
2005
Springer
14 years 3 months ago
Soft Modeling of Group Dynamics and Behavioral Attributes
: Social networks, religion and culture of human beings play a major role in the day-to-day activities performed by each individual in group oriented missions. The aggregation and ...
Soumya Banerjee, Ajith Abraham, Sang-Yong Han, P. ...
IUI
2004
ACM
14 years 3 months ago
Contextual contact retrieval
People routinely rely on physical and electronic systems to remind themselves of details regarding personal and organizational contacts. These systems include rolodexes, directori...
Jonathan Trevor, David M. Hilbert, Daniel Billsus,...