Sciweavers

201 search results - page 23 / 41
» An Authorization Logic With Explicit Time
Sort
View
CHI
2009
ACM
16 years 1 months ago
User-created forms as an effective method of human-agent communication
A key challenge for mixed-initiative systems is to create a shared understanding of the task between human and agent. To address this challenge, we created a mixed-initiative inte...
John Zimmerman, Kathryn Rivard, Ian Hargraves, Ant...
90
Voted
STOC
2003
ACM
110views Algorithms» more  STOC 2003»
16 years 27 days ago
New degree bounds for polynomial threshold functions
A real multivariate polynomial p(x1, . . . , xn) is said to sign-represent a Boolean function f : {0, 1}n {-1, 1} if the sign of p(x) equals f(x) for all inputs x {0, 1}n. We gi...
Ryan O'Donnell, Rocco A. Servedio
95
Voted
CHI
2010
ACM
15 years 7 months ago
Reactive information foraging for evolving goals
Information foraging models have predicted the navigation paths of people browsing the web and (more recently) of programmers while debugging, but these models do not explicitly m...
Joseph Lawrance, Margaret M. Burnett, Rachel K. E....
106
Voted
CHI
2010
ACM
15 years 7 months ago
A longitudinal study of how highlighting web content change affects people's web interactions
The Web is constantly changing, but most tools used to access Web content deal only with what can be captured at a single instance in time. As a result, Web users may not have a g...
Jaime Teevan, Susan T. Dumais, Daniel J. Liebling
99
Voted
CSE
2009
IEEE
15 years 7 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner