Sciweavers

35419 search results - page 108 / 7084
» How are we doing
Sort
View
102
Voted
ICSE
2009
IEEE-ACM
16 years 4 months ago
Do code clones matter?
Code cloning is not only assumed to inflate maintenance costs but also considered defect-prone as inconsistent changes to code duplicates can lead to unexpected behavior. Conseque...
Benjamin Hummel, Elmar Jürgens, Florian Deiss...
115
Voted
CHI
2008
ACM
16 years 4 months ago
What to do when search fails: finding information by association
Sometimes people cannot remember the names or locations of things on their computer, but they can remember what other things are associated with them. We created Feldspar, the fir...
Duen Horng Chau, Brad A. Myers, Andrew Faulring
106
Voted
CHI
2005
ACM
16 years 4 months ago
Virtual rear projection: do shadows matter?
Rear projection of large-scale upright displays is often preferred over front projection because of the lack of shadows that occlude the projected image. However, rear projection ...
Jay Summet, Gregory D. Abowd, Gregory M. Corso, Ja...
119
Voted
ATAL
2009
Springer
15 years 10 months ago
Smart cheaters do prosper: defeating trust and reputation systems
Traders in electronic marketplaces may behave dishonestly, cheating other agents. A multitude of trust and reputation systems have been proposed to try to cope with the problem of...
Reid Kerr, Robin Cohen
120
Voted
WIMOB
2008
IEEE
15 years 10 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...