Sciweavers

744 search results - page 119 / 149
» The Traust Authorization Service
Sort
View
DLOG
2008
15 years 2 days ago
Identifying Objects Over Time with Description Logics
A fundamental requirement for cooperating agents is to agree on a selection of component values of objects that can be used for reliably communicating references to the objects, to...
David Toman, Grant E. Weddell
CIKM
2008
Springer
14 years 11 months ago
Towards a model of understanding social search
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon...
Brynn M. Evans, Ed H. Chi
CHI
2005
ACM
14 years 11 months ago
Dealing with system response times in interactive speech applications
In this user study, we address several open issues in the design of waiting cues for system response time (SRT) in interactive telephony speech applications. User observations and...
Peter Fröhlich
CHI
2005
ACM
14 years 11 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...
ECAI
2008
Springer
14 years 11 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...