Sciweavers

4923 search results - page 200 / 985
» Software Risk Management
Sort
View
CHI
2006
ACM
16 years 5 months ago
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applicati
The emergence of location-based computing promises new and compelling applications, but raises very real privacy risks. Existing approaches to privacy generally treat people as th...
Karen P. Tang, Pedram Keyani, James Fogarty, Jason...
132
Voted
ACMICEC
2007
ACM
94views ECommerce» more  ACMICEC 2007»
15 years 9 months ago
Factors and effects of information credibility
Website success hinges on how credible the consumers consider the information on the website. Unless consumers believe the website's information is credible, they are not lik...
D. Harrison McKnight, Charles J. Kacmar
AAAI
2006
15 years 6 months ago
Properties of Forward Pruning in Game-Tree Search
Forward pruning, or selectively searching a subset of moves, is now commonly used in game-playing programs to reduce the number of nodes searched with manageable risk. Forward pru...
Yew Jin Lim, Wee Sun Lee
AIPS
2004
15 years 6 months ago
Price Prediction Strategies for Market-Based Scheduling
In a market-based scheduling mechanism, the allocation of time-specific resources to tasks is governed by a competitive bidding process. Agents bidding for multiple, separately al...
Jeffrey K. MacKie-Mason, Anna Osepayshvili, Daniel...
ENGL
2007
116views more  ENGL 2007»
15 years 4 months ago
Evacuation Planning using Answer Set Programming: An initial approach
—This paper describes a methodology based on Answer Set Programming (ASP) to work with incomplete geographic data. Source geographic data which describes a risk zone is translate...
Claudia Zepeda, David Sol