Sciweavers

1662 search results - page 52 / 333
» Privately Finding Specifications
Sort
View
96
Voted
HICSS
2007
IEEE
114views Biometrics» more  HICSS 2007»
15 years 8 months ago
A History of Indonesian Telecommunication Reform 1999-2006
This study examines the effect of Indonesia’s telecommunications policy on Internet access and the digital divide. The study finds that current government policy had minimal imp...
Susan Eick
HICSS
2005
IEEE
191views Biometrics» more  HICSS 2005»
15 years 8 months ago
Business Models for Online Communities: The Case of the Virtual Worlds Industry in China
The rapid growth of Internet usage has enabled many new online communities to develop. A particularly interesting phenomenon that has arisen through Internet communities is the vi...
Ian MacInnes, Lili Hu
HICSS
2005
IEEE
161views Biometrics» more  HICSS 2005»
15 years 8 months ago
Data Assurance in a Conventional File Systems
The goal of this research is to find a mechanism to guarantee that a file stored in a conventional file system, on disk, has not been modified. Our proposal for achieving that goa...
Sasa Rudan, Aleksandra Kovacevic, Charles A. Milli...
ATAL
2006
Springer
15 years 6 months ago
Sequences of take-it-or-leave-it offers: near-optimal auctions without full valuation revelation
Abstract. We introduce take-it-or-leave-it auctions (TLAs) as an allocation mechanism that allows buyers to retain much of their private valuation information, yet generates close-...
Tuomas Sandholm, Andrew Gilpin
130
Voted
MOBISYS
2008
ACM
15 years 4 months ago
Transient customization of mobile computing infrastructure
Kimberley enables rapid software provisioning of fixed infrastructure for transient use by a mobile device. It uses virtual machine (VM) technology, but avoids the performance cha...
Adam Wolbach, Jan Harkes, Srinivas Chellappa, Maha...