Sciweavers

809 search results - page 158 / 162
» Deploying Information Agents on the Web
Sort
View
97
Voted
WWW
2008
ACM
15 years 10 months ago
Trust-based recommendation systems: an axiomatic approach
High-quality, personalized recommendations are a key feature in many online systems. Since these systems often have explicit knowledge of social network structures, the recommenda...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...
ATAL
2009
Springer
15 years 4 months ago
From DPS to MAS to ...: continuing the trends
The most important and interesting of the computing challenges we are facing are those that involve the problems and opportunities afforded by massive decentralization and disinte...
Michael N. Huhns
94
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber
98
Voted
ASWEC
2006
IEEE
15 years 3 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
ITICSE
2004
ACM
15 years 3 months ago
Evaluating the effectiveness of ICT to support globally distributed PBL teams
In the 21st century it is becoming increasingly common to work and learn in teams that are globally distributed. Such teams rely heavily on ICT to facilitate communication. There ...
Chew Swee Cheng, Chris Beaumont