Sciweavers

1931 search results - page 350 / 387
» Why we blog
Sort
View
WSDM
2009
ACM
178views Data Mining» more  WSDM 2009»
14 years 4 months ago
User Browsing Graph: Structure, Evolution and Application
This paper focuses on ‘user browsing graph’ which is constructed with users’ click-through behavior modeled with Web access logs. User browsing graph has recently been adopt...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru
ICC
2009
IEEE
120views Communications» more  ICC 2009»
14 years 4 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
ATAL
2009
Springer
14 years 4 months ago
Perspectives and challenges of agent-based simulation as a tool for economics and other social sciences
This paper argues that the agent-based simulation approach is just the one appropriate to the social sciences (including economics). Although there were many predecessor approache...
Klaus G. Troitzsch
CHIMIT
2009
ACM
14 years 4 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
SOUPS
2009
ACM
14 years 4 months ago
A user study of the expandable grid applied to P3P privacy policy visualization
Displaying website privacy policies to consumers in ways they understand is an important part of gaining consumers’ trust and informed consent, yet most website privacy policies...
Robert W. Reeder, Patrick Gage Kelley, Aleecia M. ...