Sciweavers

791 search results - page 123 / 159
» Users and Trust in Cyberspace
Sort
View
WINE
2010
Springer
148views Economy» more  WINE 2010»
13 years 5 months ago
False-Name-Proofness in Social Networks
In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave stra...
Vincent Conitzer, Nicole Immorlica, Joshua Letchfo...
DALT
2010
Springer
13 years 2 months ago
Understanding Permissions through Graphical Norms
Abstract. Norm-aware agents are able to reason about the obligations, permissions and prohibitions that affect their operation. While much work has focused on the creation of such ...
Nir Oren, Madalina Croitoru, Simon Miles, Michael ...
MOBISYS
2009
ACM
14 years 8 months ago
Leveraging smart phones to reduce mobility footprints
Mobility footprint refers to the size, weight, and energy demand of the hardware that must be carried by a mobile user to be effective at any time and place. The ideal of a zero m...
Stephen Smaldone, Benjamin Gilbert, Nilton Bila, L...
KDD
2008
ACM
199views Data Mining» more  KDD 2008»
14 years 8 months ago
Efficient computation of personal aggregate queries on blogs
There is an exploding amount of user-generated content on the Web due to the emergence of "Web 2.0" services, such as Blogger, MySpace, Flickr, and del.icio.us. The part...
Ka Cheung Sia, Junghoo Cho, Yun Chi, Belle L. Tsen...
CHI
2007
ACM
14 years 8 months ago
An eye tracking study of the effect of target rank on web search
Web search engines present search results in a rank ordered list. This works when what a user wants is near the top, but sometimes the information that the user really wants is lo...
Zhiwei Guan, Edward Cutrell