Sciweavers

1022 search results - page 108 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
AINA
2006
IEEE
15 years 3 months ago
Resources availability for Peer to Peer systems
Nowadays, Peer to Peer systems are largely studied. But in order to evaluate them in a realistic way, a better knowledge of their environments is needed. In this article we focus o...
Georges Da Costa, Corine Marchand, Olivier Richard...
CHI
2007
ACM
16 years 1 months ago
Similarity is more important than expertise: accent effects in speech interfaces
In a balanced between-participants experiment (N = 96) American and Swedish participants listened to tourist information on a website about an American or Swedish city presented i...
Clifford Nass, Jenny Alwin, Nils Dahlbäck, Qi...
NCA
2009
IEEE
15 years 8 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman
GIS
2008
ACM
16 years 2 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
ATC
2007
Springer
15 years 7 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...