Sciweavers

47 search results - page 9 / 10
» Social Systems: Can We Do More Than Just Poke Friends
Sort
View
CEAS
2008
Springer
13 years 7 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
PLDI
2003
ACM
13 years 10 months ago
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
This paper presents a static analysis tool that can automatically find memory leaks and deletions of dangling pointers in large C and C++ applications. We have developed a type s...
David L. Heine, Monica S. Lam
WIKIS
2009
ACM
13 years 11 months ago
Herding the cats: the influence of groups in coordinating peer production
Peer production systems rely on users to self-select appropriate tasks and “scratch their personal itch”. However, many such systems require significant maintenance work, whic...
Aniket Kittur, Bryan A. Pendleton, Robert E. Kraut
ECCV
2010
Springer
13 years 9 months ago
Predicting Facial Beauty without Landmarks
A fundamental task in artificial intelligence and computer vision is to build machines that can behave like a human in recognizing a broad range of visual concepts. This paper aims...
ATAL
2009
Springer
13 years 12 months ago
Learning equilibria in repeated congestion games
While the class of congestion games has been thoroughly studied in the multi-agent systems literature, settings with incomplete information have received relatively little attenti...
Moshe Tennenholtz, Aviv Zohar