Sciweavers

897 search results - page 28 / 180
» Identity: How to name it, How to find it
Sort
View
HICSS
2009
IEEE
179views Biometrics» more  HICSS 2009»
14 years 3 months ago
Understanding Continuance Intention of Knowledge Creation in Online Communities from a Social-Psychological Perspective
Grounded on both social cognitive theory and expectation-disconfirmation theory (EDT), this study aims to investigate how individuals’ continuance intention of knowledge creatio...
Shih-Wei Chou, Ching-Chang Lee, Yu-Chieh Chang, Ch...
ACSAC
2005
IEEE
14 years 2 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
CAISE
2003
Springer
14 years 1 months ago
SIM-Filter: User Profile based Smart Information Filtering and Personalization in Smartcard
The emergence of new information and communication system technologies allow the appearance of new techniques of data processing. Thus, it is increasingly difficult to user to find...
Abdelkrim Lahlou, Pascal Urien
CEC
2007
IEEE
14 years 19 days ago
Efficient relevance estimation and value calibration of evolutionary algorithm parameters
Calibrating the parameters of an evolutionary algorithm (EA) is a laborious task. The highly stochastic nature of an EA typically leads to a high variance of the measurements. The ...
Volker Nannen, A. E. Eiben
ESCIENCE
2006
IEEE
14 years 2 months ago
Job Failure Analysis and Its Implications in a Large-Scale Production Grid
In this paper we present an initial analysis of job failures in a large-scale data-intensive Grid. Based on three representative periods in production, we characterize the interar...
Hui Li, David L. Groep, Lex Wolters, Jeffrey Templ...