Sciweavers

3299 search results - page 568 / 660
» Privacy and Trusted Computing
Sort
View
125
Voted
PODC
2009
ACM
16 years 4 months ago
Concurrent imitation dynamics in congestion games
Imitating successful behavior is a natural and frequently applied approach to trust in when facing scenarios for which we have little or no experience upon which we can base our d...
Heiner Ackermann, Petra Berenbrink, Simon Fischer,...
112
Voted
CHI
2008
ACM
16 years 4 months ago
On the benefits of confidence visualization in speech recognition
In a typical speech dictation interface, the recognizer's bestguess is displayed as normal, unannotated text. This ignores potentially useful information about the recognizer...
Keith Vertanen, Per Ola Kristensson
CHI
2007
ACM
16 years 4 months ago
How it works: a field study of non-technical users interacting with an intelligent system
In order to develop intelligent systems that attain the trust of their users, it is important to understand how users perceive such systems and develop those perceptions over time...
Joe Tullio, Anind K. Dey, Jason Chalecki, James Fo...
CHI
2007
ACM
16 years 4 months ago
An eye tracking study of the effect of target rank on web search
Web search engines present search results in a rank ordered list. This works when what a user wants is near the top, but sometimes the information that the user really wants is lo...
Zhiwei Guan, Edward Cutrell
165
Voted
ICALP
2009
Springer
16 years 4 months ago
Annotations in Data Streams
The central goal of data stream algorithms is to process massive streams of data using sublinear storage space. Motivated by work in the database community on outsourcing database...
Amit Chakrabarti, Graham Cormode, Andrew McGregor