Sciweavers

619 search results - page 105 / 124
» Characterizing user behavior in online social networks
Sort
View
WECWIS
2005
IEEE
86views ECommerce» more  WECWIS 2005»
15 years 3 months ago
The Evolution of Cooperation under Cheap Pseudonyms
A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the...
Michal Feldman, John Chuang
EXPERT
2010
145views more  EXPERT 2010»
14 years 6 months ago
Interaction Analysis with a Bayesian Trajectory Model
Human behavior recognition is one of the most important and challenging objectives performed by intelligent vision systems. Several issues must be faced in this domain ranging fro...
Alessio Dore, Carlo S. Regazzoni
CTW
2008
92views more  CTW 2008»
14 years 8 months ago
WESTT (workload, error, situational awareness, time and teamwork): an analytical prototyping system for command and control
Modern developments in the use of information technology within command and control allow unprecedented degrees of flexibility in the way teams deal with tasks. These developments...
Robert J. Houghton, Chris Baber, Malcolm Cowton, G...
CSCW
2008
ACM
14 years 11 months ago
The effects of local lag on tightly-coupled interaction in distributed groupware
Tightly-coupled interaction is shared work in which each person's actions immediately and continuously influence the actions of others. Tightly-coupled collaboration is a hal...
Dane Stuckel, Carl Gutwin
CODASPY
2011
14 years 1 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong