Sciweavers

43264 search results - page 8438 / 8653
» Comparing models of computation
Sort
View
MOBILITY
2009
ACM
15 years 5 months ago
UbiPay: minimizing transaction costs with smart mobile payments
Implementing an electronic payment system involves striking a balance between usability and security. Systems that allow payments to be completed with little effort on the part of...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Tetsuo...
RECSYS
2009
ACM
15 years 5 months ago
Conceptual recommender system for CiteSeerX
Short search engine queries do not provide contextual information, making it difficult for traditional search engines to understand what users are really requesting. One approach ...
Ajith Kodakateri Pudhiyaveetil, Susan Gauch, Hiep ...
SIGECOM
2009
ACM
117views ECommerce» more  SIGECOM 2009»
15 years 5 months ago
Sybilproof transitive trust protocols
We study protocols to enable one user (the principal) to make potentially profitable but risky interactions with another user (the agent), in the absence of direct trust between ...
Paul Resnick, Rahul Sami
SOUPS
2009
ACM
15 years 5 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
FOCS
2008
IEEE
15 years 5 months ago
Dynamic Connectivity: Connecting to Networks and Geometry
Dynamic connectivity is a well-studied problem, but so far the most compelling progress has been confined to the edge-update model: maintain an understanding of connectivity in a...
Timothy M. Chan, Mihai Patrascu, Liam Roditty
« Prev « First page 8438 / 8653 Last » Next »