Sciweavers

1776 search results - page 125 / 356
» Informational cascades in IT adoption
Sort
View
CHI
2010
ACM
15 years 2 months ago
Finding the lost treasure: understanding reuse of used computing devices
In this paper, we report our findings on the adoption practices of used personal digital assistants (PDAs) to inform reuse of outdated computing products. Our interviews with 12 e...
Jina Huh, Kevin Nam, Nikhil Sharma
109
Voted
CLEF
2010
Springer
15 years 2 months ago
Revamping Question Answering with a Semantic Approach over World Knowledge
Classic textual question answering (QA) approaches that rely on statistical keyword relevance scoring without exploiting semantic content are useful to a certain extent, but are li...
Nuno Cardoso, Iustin Dornescu, Sven Hartrumpf, Joh...
CCS
2010
ACM
15 years 2 months ago
Protecting browsers from cross-origin CSS attacks
Cross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defen...
Lin-Shung Huang, Zack Weinberg, Chris Evans, Colli...
IDA
2008
Springer
15 years 1 months ago
A comprehensive analysis of hyper-heuristics
Meta-heuristics such as simulated annealing, genetic algorithms and tabu search have been successfully applied to many difficult optimization problems for which no satisfactory pro...
Ender Özcan, Burak Bilgin, Emin Erkan Korkmaz
CAI
2006
Springer
15 years 1 months ago
Analysis and Design of Mobile Collaborative Applications Using Contextual Elements
Collaborative mobile applications support users on the move in order to perform a collaborative task. One of the challenges when designing such applications is to consider the cont...
Rosa Alarcón, Luis A. Guerrero, Sergio F. O...