Sciweavers

1497 search results - page 137 / 300
» Online Negative Databases
Sort
View
CSCW
2010
ACM
16 years 1 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
RECSYS
2009
ACM
15 years 11 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...
INFOCOM
2008
IEEE
15 years 11 months ago
Association Control in Mobile Wireless Networks
—As mobile nodes roam in a wireless network, they continuously associate with different access points and perform handoff operations. However, these handoffs can potentially incu...
Minkyong Kim, Zhen Liu, Srinivasan Parthasarathy 0...
RTCSA
2008
IEEE
15 years 11 months ago
Energy Management for Periodic Real-Time Tasks with Variable Assurance Requirements
Reliability-aware power management (RAPM) schemes, which consider the negative effects of voltage scaling on system reliability, were recently studied to save energy while preserv...
Dakai Zhu, Xuan Qi, Hakan Aydin
HICSS
2007
IEEE
96views Biometrics» more  HICSS 2007»
15 years 10 months ago
Information Privacy and Trust in Government: a citizen-based perspective from New Zealand
Increasing use of e-government has raised issues about the privacy of information provided by citizens to government. This paper explores the experiences and concerns of New Zeala...
Rowena Cullen, Patrick Reilly