Sciweavers

15 search results - page 3 / 3
» Voting before Discussing: Computer Voting as Social Communic...
Sort
View
SIGCOMM
2006
ACM
13 years 11 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
CHI
2010
ACM
14 years 3 days ago
Short and tweet: experiments on recommending content from information streams
More and more web users keep up with newest information through information streams such as the popular microblogging website Twitter. In this paper we studied content recommendat...
Jilin Chen, Rowan Nairn, Les Nelson, Michael Berns...
NORDICHI
2004
ACM
13 years 10 months ago
InfoRadar: group and public messaging in the mobile context
Previous research has sought to utilize everyday messaging metaphors, such as the notice board, in location-based messaging systems. Unfortunately, many of the restrictions associ...
Matti Rantanen, Antti Oulasvirta, Jan Blom, Sauli ...
CHI
2005
ACM
14 years 5 months ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt
GROUP
2007
ACM
13 years 9 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...