Sciweavers

2678 search results - page 483 / 536
» Voting in social networks
Sort
View
NSPW
2006
ACM
14 years 2 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner
SIGIR
2006
ACM
14 years 2 months ago
Contextual search and name disambiguation in email using graphs
Similarity measures for text have historically been an important tool for solving information retrieval problems. In many interesting settings, however, documents are often closel...
Einat Minkov, William W. Cohen, Andrew Y. Ng
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
14 years 2 months ago
Interoperability in E-Government: More than Just Smart Middleware
According to Layne and Lee (2001), electronic Government (e-Government, e-Gov) progresses towards higher levels of integration and interoperability among and between government le...
Hans Jochen Scholl
TRIDENTCOM
2005
IEEE
14 years 2 months ago
A Testbed for Evaluating Human Interaction with Ubiquitous Computing Environments
Core to ubiquitous computing environments are adaptive software systems that adapt their behavior to the context in which the user is attempting the task the system aims to suppor...
Eleanor O'Neill, Martin Klepal, David Lewis, Tony ...