Sciweavers

2492 search results - page 424 / 499
» False-Name-Proofness in Social Networks
Sort
View
IJKL
2007
97views more  IJKL 2007»
15 years 1 months ago
Knowledge society arguments revisited in the semantic technologies era
: In the light of high profile governmental and international efforts to realise the knowledge society, I review the arguments made for and against it from a technology standpoint....
Yannis Kalfoglou
AIR
2005
158views more  AIR 2005»
15 years 1 months ago
Review on Computational Trust and Reputation Models
The scientific research in the area of computational mechanisms for trust and reputation in virtual societies is a recent discipline oriented to increase the reliability and perfor...
Jordi Sabater, Carles Sierra
BEHAVIOURIT
2005
79views more  BEHAVIOURIT 2005»
15 years 1 months ago
Usage and user experience of communication before and during rendezvous
This paper reports a field evaluation of the mobile phone as a `package' of device and services. The evaluation compares 44 university students' usage and user experienc...
Martin Colbert
TITB
2008
204views more  TITB 2008»
15 years 1 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
IS
2010
15 years 12 days ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...