Sciweavers

7918 search results - page 1364 / 1584
» Model Composition Directives
Sort
View
123
Voted
ACMICEC
2007
ACM
102views ECommerce» more  ACMICEC 2007»
15 years 7 months ago
Security when people matter: structuring incentives for user behavior
Humans are "smart components" in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives p...
Rick Wash, Jeffrey K. MacKie-Mason
139
Voted
ACMSE
2007
ACM
15 years 7 months ago
Enhancing clustering blog documents by utilizing author/reader comments
Blogs are a new form of internet phenomenon and a vast everincreasing information resource. Mining blog files for information is a very new research direction in data mining. We p...
Beibei Li, Shuting Xu, Jun Zhang
138
Voted
ASUNAM
2009
IEEE
15 years 7 months ago
Groupthink and Peer Pressure: Social Influence in Online Social Network Groups
In this paper, we present a horizontal view of social influence, more specifically a quantitative study of the influence of neighbours on the probability of a particular node to jo...
Pan Hui, Sonja Buchegger
129
Voted
CIDM
2009
IEEE
15 years 7 months ago
Handling continuous attributes in Ant Colony Classification algorithms
Most real-world classification problems involve continuous (real-valued) attributes, as well as, nominal (discrete) attributes. The majority of Ant Colony Optimisation (ACO) classi...
Fernando E. B. Otero, Alex Alves Freitas, Colin G....
119
Voted
PODC
2010
ACM
15 years 7 months ago
Bayesian ignorance
We quantify the effect of Bayesian ignorance by comparing the social cost obtained in a Bayesian game by agents with local views to the expected social cost of agents having glob...
Noga Alon, Yuval Emek, Michal Feldman, Moshe Tenne...
« Prev « First page 1364 / 1584 Last » Next »