Sciweavers

1068 search results - page 166 / 214
» Group Dominant Strategies
Sort
View
CHI
2004
ACM
15 years 10 months ago
Email task management styles: the cleaners and the keepers
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...
Jacek Gwizdka
CSCW
2010
ACM
15 years 6 months ago
Why the plan doesn't hold: a study of situated planning, articulation and coordination work in a surgical ward
Most studies of plans and situated work have applied ethnographic methods and and thus fail to provide any quantitative insight into the extent of this phenomenon. We present a st...
Jakob E. Bardram, Thomas Riisgaard Hansen
CHI
2010
ACM
15 years 4 months ago
Sharing conversation and sharing life: video conferencing in the home
Video conferencing is a technology that families and friends use to connect with each other over distance. However, even with such technology readily available, we still do not ha...
Tejinder K. Judge, Carman Neustaedter
AINA
2009
IEEE
15 years 4 months ago
Multi-node Processing for Asymmetrical Communications in Underwater Acoustic Networks
— Underwater acoustic communication networks have attracted attention for its applications in many areas such as mine warfare, rapid environmental assessment or search and rescue...
Antonio Silva, Julien Huillery, Sergio M. Jesus
CHI
2009
ACM
15 years 4 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...