Sciweavers

1229 search results - page 196 / 246
» Trusted Computing
Sort
View
CHI
2008
ACM
13 years 8 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
HUC
2010
Springer
13 years 8 months ago
Toolkit to support intelligibility in context-aware applications
Context-aware applications should be intelligible so users can better understand how they work and improve their trust in them. However, providing intelligibility is nontrivial an...
Brian Y. Lim, Anind K. Dey
SAC
2008
ACM
13 years 7 months ago
Contextualizing normative open multi-agent systems
Open MASs can be extremely dynamic due to heterogeneous agents that migrate among them to obtain resources or services not found locally. In order to prevent malicious actions and...
Carolina Howard Felicíssimo, Caroline Chopi...
MIDDLEWARE
2010
Springer
13 years 6 months ago
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications
Recent Internet applications, such as online social networks and user-generated content sharing, produce an unprecedented amount of social information, which is further augmented b...
Nicolas Kourtellis, Joshua Finnis, Paul Anderson, ...
RECOMB
2010
Springer
13 years 6 months ago
Detecting Highways of Horizontal Gene Transfer
Abstract. In a horizontal gene transfer (HGT) event a gene is transferred between two species that do not share an ancestor-descendant relationship. Typically, no more than a few g...
Mukul S. Bansal, J. Peter Gogarten, Ron Shamir