Sciweavers

2588 search results - page 183 / 518
» Project risk management
Sort
View
132
Voted
CHI
2006
ACM
16 years 3 months ago
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applicati
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as th...
Karen P. Tang, Pedram Keyani, James Fogarty, Jason...
122
Voted
IH
1998
Springer
15 years 7 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
118
Voted
ACMICEC
2007
ACM
94views ECommerce» more  ACMICEC 2007»
15 years 7 months ago
Factors and effects of information credibility
Website success hinges on how credible the consumers consider the information on the website. Unless consumers believe the website's information is credible, they are not lik...
D. Harrison McKnight, Charles J. Kacmar
108
Voted
AAAI
2006
15 years 5 months ago
Properties of Forward Pruning in Game-Tree Search
Forward pruning, or selectively searching a subset of moves, is now commonly used in game-playing programs to reduce the number of nodes searched with manageable risk. Forward pru...
Yew Jin Lim, Wee Sun Lee
136
Voted
AIPS
2004
15 years 5 months ago
Price Prediction Strategies for Market-Based Scheduling
In a market-based scheduling mechanism, the allocation of time-specific resources to tasks is governed by a competitive bidding process. Agents bidding for multiple, separately al...
Jeffrey K. MacKie-Mason, Anna Osepayshvili, Daniel...