Sciweavers

26957 search results - page 5326 / 5392
» Information Systems Modernization
Sort
View
HUC
2010
Springer
15 years 1 months ago
Empirical models of privacy in location sharing
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing ...
Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, ...
HUC
2010
Springer
15 years 1 months ago
Modeling people's place naming preferences in location sharing
Most location sharing applications display people's locations on a map. However, people use a rich variety of terms to refer to their locations, such as "home," &qu...
Jialiu Lin, Guang Xiang, Jason I. Hong, Norman M. ...
105
Voted
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
15 years 1 months ago
Managing team-based problem solving with symbiotic bid-based genetic programming
Bid-based Genetic Programming (GP) provides an elegant mechanism for facilitating cooperative problem decomposition without an a priori specification of the number of team member...
Peter Lichodzijewski, Malcolm I. Heywood
115
Voted
ACMDIS
2010
ACM
15 years 23 days ago
The CLOTHO project: predicting application utility
When using the computer, each user has some notion that "these applications are important" at a given point in time. We term this subset of applications that the user va...
Joshua M. Hailpern, Nicholas Jitkoff, Joseph Subid...
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
15 years 22 days ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
« Prev « First page 5326 / 5392 Last » Next »