Sciweavers

1662 search results - page 192 / 333
» Privately Finding Specifications
Sort
View
107
Voted
ACMICEC
2007
ACM
129views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Modeling trust in e-commerce: an approach based on user requirements
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
Alireza Pourshahid, Thomas T. Tran
110
Voted
ASUNAM
2009
IEEE
15 years 4 months ago
Groupthink and Peer Pressure: Social Influence in Online Social Network Groups
In this paper, we present a horizontal view of social influence, more specifically a quantitative study of the influence of neighbours on the probability of a particular node to jo...
Pan Hui, Sonja Buchegger
98
Voted
ASPDAC
2007
ACM
119views Hardware» more  ASPDAC 2007»
15 years 4 months ago
Optimum Prefix Adders in a Comprehensive Area, Timing and Power Design Space
Parallel prefix adder is the most flexible and widely-used binary adder for ASIC designs. Many high-level synthesis techniques have been developed to find optimal prefix structures...
Jianhua Liu, Yi Zhu, Haikun Zhu, Chung-Kuan Cheng,...
CCS
2007
ACM
15 years 4 months ago
Formal correctness of conflict detection for firewalls
We describe the formalization of a correctness proof for a conflict detection algorithm for firewalls in the Coq Proof Assistant. First, we give formal definitions in Coq of a fir...
Venanzio Capretta, Bernard Stepien, Amy P. Felty, ...
79
Voted
CHI
2007
ACM
15 years 4 months ago
An exploration of web-based monitoring: implications for design
Monitoring occurs when users return to previously viewed web pages to view new or updated information. While tools exist to support web-based monitoring, we know little about the ...
Melanie Kellar, Carolyn R. Watters, Kori M. Inkpen