Sciweavers

1746 search results - page 292 / 350
» On the expressiveness of interaction
Sort
View
JSAC
2008
95views more  JSAC 2008»
14 years 11 months ago
Game Theoretic Modeling of Malicious Users in Collaborative Networks
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the p...
George Theodorakopoulos, John S. Baras
ENTCS
2007
101views more  ENTCS 2007»
14 years 11 months ago
Model-checking Distributed Components: The Vercors Platform
This article presents a component verification platform called Vercors providing means to analyse the behaviour properties of applications built from distributed components. From...
Tomás Barros, Antonio Cansado, Eric Madelai...
SIGIR
2008
ACM
14 years 11 months ago
To personalize or not to personalize: modeling queries with variation in user intent
In most previous work on personalized search algorithms, the results for all queries are personalized in the same manner. However, as we show in this paper, there is a lot of vari...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
SIGKDD
2008
87views more  SIGKDD 2008»
14 years 11 months ago
Blogosphere: research issues, tools, and applications
Weblogs, or Blogs, have facilitated people to express their thoughts, voice their opinions, and share their experiences and ideas. Individuals experience a sense of community, a f...
Nitin Agarwal, Huan Liu
TAP
2008
Springer
102views Hardware» more  TAP 2008»
14 years 11 months ago
A Logic-Based Approach to Combinatorial Testing with Constraints
Abstract. Usage of combinatorial testing is wide spreading as an effective technique to reveal unintended feature interaction inside a given system. To this aim, test cases are con...
Andrea Calvagna, Angelo Gargantini