Sciweavers

63 search results - page 8 / 13
» Investigating user account control practices
Sort
View
RECSYS
2010
ACM
13 years 6 months ago
RECON: a reciprocal recommender for online dating
The reciprocal recommender is a class of recommender system that is important for several tasks where people are both the subjects and objects of the recommendation. Some examples...
Luiz Augusto Sangoi Pizzato, Tomek Rej, Thomas Chu...
PDIS
1994
IEEE
13 years 11 months ago
Distributed Selective Dissemination of Information
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Tak W. Yan, Hector Garcia-Molina
ACMDIS
2006
ACM
14 years 1 months ago
"It's Just a Method!": a pedagogical experiment in interdisciplinary design
In the excitement of the cognitive revolution, Simon proposed a way of thinking about design that promised to make it more manageable and cognitive: to think of design as a planni...
Steve R. Harrison, Maribeth Back, Deborah G. Tatar
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
WSC
1998
13 years 9 months ago
Interactive Implementation of Optimal Simulation Experiment Designs
An attractive feature of many simulation packages is their availability on desktop computers and their potential for allowing the user to run a simulation model under different co...
Russell C. H. Cheng, John D. Lamb