Sciweavers

274 search results - page 39 / 55
» Reducing truth-telling online mechanisms to online optimizat...
Sort
View
IPTPS
2005
Springer
14 years 27 days ago
An Empirical Study of Free-Riding Behavior in the Maze P2P File-Sharing System
Maze1 is a P2P file-sharing system with an active and large user base. It is developed, deployed and operated by an academic research team. As such, it offers ample opportunities ...
Mao Yang, Zheng Zhang, Xiaoming Li, Yafei Dai
USENIX
2007
13 years 9 months ago
Using Provenance to Aid in Personal File Search
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...
EDM
2008
289views Data Mining» more  EDM 2008»
13 years 8 months ago
Developing a Log-based Motivation Measuring Tool
The purpose of this study is to develop a conceptual framework and a tool for measuring motivation of online learners. The study was carried out in three phases, the first of which...
Arnon Hershkovitz, Rafi Nachmias
CHI
2010
ACM
13 years 2 months ago
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishin...
Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumara...
WIOPT
2010
IEEE
13 years 5 months ago
Reservation policies for revenue maximization from secondary spectrum access in cellular networks
We consider the problem of providing opportunistic spectrum access to secondary users in wireless cellular networks. From the standpoint of spectrum license holders, achieving ben...
Ashraf Al Daoud, Murat Alanyali, David Starobinski