Sciweavers

2492 search results - page 461 / 499
» False-Name-Proofness in Social Networks
Sort
View
CDVE
2004
Springer
109views Visualization» more  CDVE 2004»
14 years 3 months ago
Interest Management for Collaborative Environments Through Dividing Their Shared State
Not all participants in a collaborative virtual environment (CVE) need to be informed of every other participant’s activities. The technique used for filtering irrelevant message...
Michal Masa, Jiri Zara
ISMIR
2004
Springer
168views Music» more  ISMIR 2004»
14 years 3 months ago
Music Information Retrieval systems: why do individuals use them and what are their needs?
: To date there has been very little research conducted on the behaviour of music information retrieval (MIR) users, in spite of the immense popularity of free music retrieval sys...
Sara Taheri-Panah, Andrew MacFarlane
CISIS
2010
IEEE
14 years 3 months ago
Semantic Web Fostering Enterprise 2.0
—The term Enterprise 2.0 applies to the use of Web 2.0 technologies as a support for business activities within the organizations. These technologies are exploited to foster inte...
Nicola Capuano, Matteo Gaeta, Francesco Orciuoli, ...
IUI
2003
ACM
14 years 3 months ago
A zero-input interface for leveraging group experience in web browsing
The experience of a trusted group of colleagues can help users improve the quality and focus of their browsing and searching activities. How could a system provide such help, when...
Taly Sharon, Henry Lieberman, Ted Selker
WMASH
2003
ACM
14 years 3 months ago
Challenge: ubiquitous location-aware computing and the "place lab" initiative
To be widely adopted, location-aware computing must be as effortless, familiar and rewarding as web search tools like Google. We envisage the global scale Place Lab, consisting of...
Bill N. Schilit, Anthony LaMarca, Gaetano Borriell...