Sciweavers

1022 search results - page 108 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
AINA
2006
IEEE
14 years 4 days ago
Resources availability for Peer to Peer systems
Nowadays, Peer to Peer systems are largely studied. But in order to evaluate them in a realistic way, a better knowledge of their environments is needed. In this article we focus o...
Georges Da Costa, Corine Marchand, Olivier Richard...
CHI
2007
ACM
14 years 10 months ago
Similarity is more important than expertise: accent effects in speech interfaces
In a balanced between-participants experiment (N = 96) American and Swedish participants listened to tourist information on a website about an American or Swedish city presented i...
Clifford Nass, Jenny Alwin, Nils Dahlbäck, Qi...
NCA
2009
IEEE
14 years 4 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
GIS
2008
ACM
14 years 11 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
ATC
2007
Springer
14 years 4 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...