Sciweavers

252 search results - page 41 / 51
» Why Do Upgrades Fail and What Can We Do about It
Sort
View
CCS
2000
ACM
13 years 11 months ago
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
The Internet provides an environment where two parties, who are virtually strangers to each other, can make connections and do business together. Before any actual business starts...
Ting Yu, Xiaosong Ma, Marianne Winslett
GRAPHICSINTERFACE
1996
13 years 9 months ago
Awareness Through Fisheye Views in Relaxed-WYSIWIS Groupware
Desktop conferencing systems are now shifting from strict view-sharing towards relaxed "what-you-see-iswhat-I-see" interfaces, where distributed participants in a real t...
Saul Greenberg, Carl Gutwin, Andy Cockburn
ATAL
2011
Springer
12 years 7 months ago
Information elicitation for decision making
Proper scoring rules, particularly when used as the basis for a prediction market, are powerful tools for eliciting and aggregating beliefs about events such as the likely outcome...
Yiling Chen, Ian A. Kash
KR
1991
Springer
13 years 11 months ago
Meta-Reasoning in Executable Temporal Logic
Temporal logic can be used as a programming language. If temporal formulae are represented in the form of an implication where the antecedent refers to the past, and the consequen...
Howard Barringer, Michael Fisher, Dov M. Gabbay, A...
AFP
2004
Springer
105views Formal Methods» more  AFP 2004»
14 years 1 months ago
Epigram: Practical Programming with Dependent Types
Abstraction and application, tupling and projection: these provide the ‘software engineering’ superstructure for programs, and our familiar type systems ensure that these opera...
Conor McBride