Sciweavers

515 search results - page 84 / 103
» Measuring Voter-Controlled Privacy
Sort
View
SIGOPSE
2004
ACM
14 years 3 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
OOPSLA
2004
Springer
14 years 3 months ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
OOPSLA
2004
Springer
14 years 3 months ago
A framework for detecting, assessing and visualizing performance antipatterns in component based systems
Component-based enterprise systems often suffer from performance issues as a result of poor system design. In this paper, we propose a framework to automatically detect, assess an...
Trevor Parsons
CP
2008
Springer
13 years 11 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
BCSHCI
2008
13 years 11 months ago
The roles of time, place, value and relationships in collocated photo sharing with camera phones
Photo sharing on camera phones is becoming a common way to maintain closeness and relationships with friends and family. How people share their photos in collocated settings using...
Hanna Stelmaszewska, Bob Fields, Ann Blandford