Sciweavers

1027 search results - page 125 / 206
» Opening Up The Enterprise
Sort
View
JCDL
2005
ACM
90views Education» more  JCDL 2005»
15 years 5 months ago
An initial evaluation of automated organization for digital library browsing
In this article we present an evaluation of text clustering and classification methods for creating digital library browse interfaces, focusing on the particular case of collecti...
Aaron Krowne, Martin Halbert
SOFTVIS
2005
ACM
15 years 5 months ago
Visualizing multiple evolution metrics
Observing the evolution of very large software systems is difficult because of the sheer amount of information that needs to be analyzed and because the changes performed in the s...
Martin Pinzger, Harald Gall, Michael Fischer, Mich...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
15 years 5 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
AP2PC
2005
Springer
15 years 5 months ago
Incentive-Compatibility in a Distributed Autonomous Currency System
Peer-to-peer complementary currencies can be powerful tools for promoting exchanges and building sustainable relationships among selfish peers on the Internet. i-WAT[10] is a prop...
Kenji Saito, Eiichi Morino, Jun Murai
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
15 years 5 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin