Sciweavers

1663 search results - page 275 / 333
» Privacy and Identity Management
Sort
View
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
16 years 8 days ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
WWW
2010
ACM
15 years 6 months ago
Scalable discovery of contradictions on the web
Our study addresses the problem of large-scale contradiction detection and management, from data extracted from the Web. We describe the first systematic solution to the problem,...
Mikalai Tsytsarau, Themis Palpanas, Kerstin Deneck...
CHI
2010
ACM
15 years 6 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner
SIGECOM
2009
ACM
139views ECommerce» more  SIGECOM 2009»
15 years 6 months ago
Simple versus optimal mechanisms
The monopolist’s theory of optimal single-item auctions for agents with independent private values can be summarized by two statements. The first is from Myerson [8]: the optim...
Jason D. Hartline, Tim Roughgarden
VRML
2009
ACM
15 years 6 months ago
Interactive stories on the net: a model and an architecture for X3D worlds
This work discusses a model and an architecture for interactive stories to be displayed on the net, designed for being independent from the specific story represented and suitabl...
Efrem Carnielli, Fabio Pittarello