Sciweavers

3155 search results - page 62 / 631
» How Are You Doing
Sort
View
ICWSM
2010
13 years 9 months ago
Why do Users Tag? Detecting Users' Motivation for Tagging in Social Tagging Systems
While recent progress has been achieved in understanding the structure and dynamics of social tagging systems, we know little about the underlying user motivations for tagging, an...
Markus Strohmaier, Christian Körner, Roman Ke...
SPLC
2008
13 years 9 months ago
Do SAT Solvers Make Good Configurators?
A configuration process is about finding a configuration, a setting, that satisfies the requirements given by the user and constraints imposed by the domain. Feature models are us...
Mikolás Janota
CSREASAM
2006
13 years 9 months ago
Do No Harm: The Use of RFID Tags in a Medical Environment
- With the increasing usage of RFID systems and their potential in a range of common applications especially medical related fields, it is important to investigate the weaknesses o...
Christopher Bolan
DIGRA
2005
Springer
14 years 1 months ago
Gaining Advantage: How Videogame Players Define and Negotiate Cheating
This paper addresses players’ uses of supplemental items during gameplay, how they define what is and is not “cheating” in reference to these items, and then, what actions t...
Mia Consalvo
ESORICS
2009
Springer
14 years 8 months ago
Model-Checking DoS Amplification for VoIP Session Initiation
Current techniques for the formal modeling analysis of DoS attacks do not adequately deal with amplification attacks that may target a complex distributed system as a whole rather ...
Carl A. Gunter, José Meseguer, Musab AlTurk...