Sciweavers

3274 search results - page 567 / 655
» Communication strategies in games
Sort
View
CHI
2010
ACM
15 years 6 months ago
What do you know?: experts, novices and territoriality in collaborative systems
When experts participate in collaborative systems, tension may arise between them and novice contributors. In particular, when experts perceive novices as a bother or a threat, th...
Jennifer Thom-Santelli, Dan Cosley, Geri Gay
CHI
2010
ACM
15 years 6 months ago
Transforming clinic environments into information workspaces for patients
Although clinic environments are a primary location for exchanging information with clinicians, patients experience these spaces as harsh environments to access, use, exchange, an...
Kenton T. Unruh, Meredith M. Skeels, Andrea Civan-...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 6 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 6 months ago
Local-Global: Reconciling Mismatched Ontologies in Development Information Systems
This paper extends pre-existing digital divide conceptualizations to further investigate the important issue of mismatches between the ontologies of state-created information syst...
Jessica Seddon Wallack, Ramesh Srinivasan
MSWIM
2009
ACM
15 years 6 months ago
HUBCODE: message forwarding using hub-based network coding in delay tolerant networks
Most people-centric delay tolerant networks have been shown to exhibit power-law behavior. Analysis of the temporal connectivity graph of such networks reveals the existence of hu...
Shabbir Ahmed, Salil S. Kanhere