Sciweavers

17018 search results - page 188 / 3404
» From the How to the What
Sort
View
CHI
2011
ACM
13 years 1 months ago
Computers can't give credit: how automatic attribution falls short in an online remixing community
In this paper, we explore the role that attribution plays in shaping user reactions to content reuse, or remixing, in a large user-generated content community. We present two stud...
Andrés Monroy-Hernández, Benjamin Ma...
ICSE
2004
IEEE-ACM
14 years 9 months ago
Evidence-Based Software Engineering
Objective: Our objective is to describe how software engineering might benefit from an evidence-based approach and to identify the potential difficulties associated with the appro...
Barbara A. Kitchenham, Magne Jørgensen, Tor...
IFIP11
2004
110views Business» more  IFIP11 2004»
13 years 11 months ago
A Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [1] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. Th...
Andreas Pashalidis, Chris J. Mitchell
ENGL
2007
101views more  ENGL 2007»
13 years 9 months ago
Fault Tolerant Multi-Agent Systems: its communication and cooperation
— Intelligent Agents have originated a lot of discussion about what they are, and how they are different from general programs. We describe in this paper a new paradigm for intel...
Arnulfo Alanis Garza, Juan José Serrano, Ra...
CHI
2008
ACM
14 years 10 months ago
Designs on dignity: perceptions of technology among the homeless
Technology, it is argued, has the potential to improve everyone's life: from the workplace, to entertainment, to easing chores around the home. But what of people who have ne...
Christopher A. Le Dantec, W. Keith Edwards