Sciweavers

745 search results - page 143 / 149
» Social Information Processing in Social News Aggregation
Sort
View
DSS
2007
226views more  DSS 2007»
14 years 9 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
ECRA
2002
113views more  ECRA 2002»
14 years 9 months ago
A European perspective towards online one-stop government: the eGOV project
E-Government reflects current visions for public administrations towards modernization and reorganization. Thereof, online one-stop Government targets the improvement of customer-...
Maria Wimmer
104
Voted
ATAL
2011
Springer
13 years 9 months ago
Incentive design for adaptive agents
We consider a setting in which a principal seeks to induce an adaptive agent to select a target action by providing incentives on one or more actions. The agent maintains a belief...
Yiling Chen, Jerry Kung, David C. Parkes, Ariel D....
ATAL
2004
Springer
15 years 2 months ago
Strategic Deception in Agents
CHRISTIAN, DAVID B. Strategic Deception in Agents. (Under the direction of Assistant Professor R. Michael Young). Despite its negative ethical connotations, deception is a useful ...
David B. Christian, R. Michael Young
ASSETS
2004
ACM
15 years 3 months ago
Semantic bookmarking for non-visual web access
Bookmarks are shortcuts that enable quick access of the desired Web content. They have become a standard feature in any browser and recent studies have shown that they can be very...
Saikat Mukherjee, I. V. Ramakrishnan, Michael Kife...