Sciweavers

1124 search results - page 171 / 225
» Hidden Market Design
Sort
View
86
Voted
WWW
2008
ACM
16 years 10 days ago
Exploiting semantic web technologies to model web form interactions
Form mapping is the key problem that needs to be solved in order to get access to the hidden web. Currently available solutions for fully automatic mapping are not ready for comme...
Bernhard Krüpl, Robert Baumgartner, Wolfgang ...
WWW
2007
ACM
16 years 10 days ago
A probabilistic semantic approach for discovering web services
Service discovery is one of challenging issues in Service-Oriented computing. Currently, most of the existing service discovering and matching approaches are based on keywords-bas...
Jiangang Ma, Jinli Cao, Yanchun Zhang
WWW
2007
ACM
16 years 10 days ago
Measuring credibility of users in an e-learning environment
Learning Villages (LV) is an E-learning platform for people's online discussions and frequently citing postings of one another. In this paper, we propose a novel method to ra...
Wei Wei, Jimmy Ho-Man Lee, Irwin King
SIGCSE
2009
ACM
150views Education» more  SIGCSE 2009»
16 years 7 days ago
Dereferee: exploring pointer mismanagement in student code
Dynamic memory management and the use of pointers are critical topics in teaching the C++ language. They are also some of the most difficult for students to grasp properly. The re...
Anthony Allevato, Manuel A. Pérez-Qui&ntild...
87
Voted
CHES
2009
Springer
171views Cryptology» more  CHES 2009»
16 years 6 days ago
Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
Abstract. The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, mal...
Christof Paar, Lang Lin, Markus Kasper, Tim Gü...