Sciweavers

35419 search results - page 58 / 7084
» How are we doing
Sort
View
ATAL
2006
Springer
15 years 7 months ago
Certified reputation: how an agent can trust a stranger
Current computational trust models are usually built either on an agent's direct experience of an interaction partner (interaction trust) or reports provided by third parties...
Trung Dong Huynh, Nicholas R. Jennings, Nigel R. S...
JSYML
2010
114views more  JSYML 2010»
15 years 1 months ago
The Ackermann functions are not optimal, but by how much?
By taking a closer look at the construction of an Ackermann function we see that between any primitive recursive degree and its Ackermann modification there is a dense chain of p...
Harold Simmons
105
Voted
DSML
2008
107views Formal Methods» more  DSML 2008»
15 years 4 months ago
How Web 2.0 can Leverage Model Engineering in Practice
: Today's online model repositories offer to download and view the textual specifications of e.g. metamodels and models in the browser. For users, in order to efficiently sear...
Manuel Wimmer, Andrea Schauerhuber, Michael Stromm...
126
Voted
CHI
2007
ACM
16 years 3 months ago
Let's go to the whiteboard: how and why software developers use drawings
Software developers are rooted in the written form of their code, yet they often draw diagrams representing their code. Unfortunately, we still know little about how and why they ...
Mauro Cherubini, Gina Venolia, Robert DeLine, Andr...
CHI
2009
ACM
16 years 4 months ago
Remembrance of things tagged: how tagging effort affects tag production and human memory
We developed a low-effort interaction method called Click2Tag for social bookmarking. Information foraging theory predicts that the production of tags will increase as the effort ...
Raluca Budiu, Peter Pirolli, Lichan Hong