Sciweavers

499 search results - page 59 / 100
» Why neighbor-joining works
Sort
View
WWW
2007
ACM
14 years 10 months ago
Exposing private information by timing web applications
We show that the time web sites take to respond to HTTP requests can leak private information, using two different types of attacks. The first, direct timing, directly measures re...
Andrew Bortz, Dan Boneh
WWW
2004
ACM
14 years 10 months ago
Understanding user goals in web search
Previous work on understanding user web search behavior has focused on how people search and what they are searching for, but not why they are searching. In this paper, we describ...
Daniel E. Rose, Danny Levinson
WWW
2004
ACM
14 years 10 months ago
Towards the composition of Ad Hoc B2B Applications: Semantics, Properties and Complexity Management
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
Jaime Delgado, Rosa Gil, Zièd Choukair
CHI
2005
ACM
14 years 10 months ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
CHI
2004
ACM
14 years 10 months ago
Think different: increasing online community participation using uniqueness and group dissimilarity
Online communities can help people form productive relationships. Unfortunately, this potential is not always fulfilled: many communities fail, and designers don't have a sol...
Pamela J. Ludford, Dan Cosley, Dan Frankowski, Lor...