Sciweavers

365 search results - page 49 / 73
» Determining Internet Users' Values for Private Information
Sort
View
ESEC
1999
Springer
15 years 1 months ago
Comparison Checking: An Approach to Avoid Debugging of Optimized Code
Abstract. We present a novel approach to avoid the debugging of optimized code through comparison checking. In the technique presented, both the unoptimized and optimized versions ...
Clara Jaramillo, Rajiv Gupta, Mary Lou Soffa
SAC
2005
ACM
15 years 3 months ago
SVD-based collaborative filtering with privacy
Collaborative filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. Such techniques recommend products to customers using similar users...
Huseyin Polat, Wenliang Du
TON
1998
107views more  TON 1998»
14 years 9 months ago
Migrating sockets--end system support for networking with quality of service guarantees
—We present an end system architecture designed to support networking with quality of service (QoS) guarantees. The protocol processing component of the architecture, called Migr...
David K. Y. Yau, Simon S. Lam
HT
2004
ACM
15 years 3 months ago
Head-tail display: a lightweight approach to query-dependent document display
The value of showing important, yet separated, parts of a document simultaneously motivates head-tail display. 35% of Web documents tested benefit. A head-tail display provides a ...
Daniel Berleant, Jinghao Miao, M. Arvold, J. Brown...
90
Voted
WWW
2009
ACM
15 years 10 months ago
Rapid development of spreadsheet-based web mashups
The rapid growth of social networking sites and web communities have motivated web sites to expose their APIs to external developers who create mashups by assembling existing func...
Woralak Kongdenfha, Boualem Benatallah, Julien Vay...