Sciweavers

1149 search results - page 164 / 230
» What Are Iteration Theories
Sort
View
CSCW
2010
ACM
14 years 5 months ago
An empirical study of critical mass and online community survival
There is general consensus that critical mass at inception ensures the sustained success of online communities. However, no clear understanding of what constitutes such a 'cr...
Daphne R. Raban, Mihai Moldovan, Quentin Jones
WWW
2010
ACM
14 years 3 months ago
How much is your personal recommendation worth?
Suppose you buy a new laptop and, simply because you like it so much, you recommend it to friends, encouraging them to purchase it as well. What would be an adequate price for the...
Paul Dütting, Monika Henzinger, Ingmar Weber
CHI
2010
ACM
14 years 3 months ago
Contravision: exploring users' reactions to futuristic technology
How can we best explore the range of users' reactions when developing future technologies that maybe controversial, such as personal healthcare systems? Our approach – Cont...
Clara Mancini, Yvonne Rogers, Arosha K. Bandara, T...
EUROSEC
2010
ACM
14 years 3 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
INFOCOM
2009
IEEE
14 years 3 months ago
Analysis of Adaptive Incentive Protocols for P2P Networks
— Incentive protocols play a crucial role to encourage cooperation among nodes in networking applications. The aim of this paper is to provide a general analytical framework to a...
Ben Q. Zhao, John C. S. Lui, Dah-Ming Chiu