Sciweavers

2648 search results - page 318 / 530
» Human Factors In Computer Security
Sort
View
116
Voted
ATAL
2011
Springer
14 years 3 months ago
Forgetting through generalisation: a companion with selective memory
This research investigates event generalisation in computational episodic memory for artificial companions. Two studies indicated a preference of a biologically-inspired selectiv...
Mei Yii Lim, Ruth Aylett, Patrícia Amâ...
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
16 years 3 months ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky
CSCW
2010
ACM
16 years 11 days ago
On the "localness" of user-generated content
The “localness” of participation in repositories of usergenerated content (UGC) with geospatial components has been cited as one of UGC’s greatest benefits. However, the deg...
Brent Hecht, Darren Gergle
111
Voted
TEI
2010
ACM
142views Hardware» more  TEI 2010»
15 years 10 months ago
Physics on display: tangible graphics on hexagonal bezel-less screens
In this paper, we present a tiled display system made out of hexagonal cardboard screens with no visible bezel. Use of a bezel-less hexagonal form factor allows users to build lar...
Mike Rooke, Roel Vertegaal
111
Voted
CSCW
2006
ACM
15 years 9 months ago
What goes around comes around: an analysis of del.icio.us as social space
An emergent class of web applications blurs the boundary between single user application and online public space. Recently popular web applications like del.icio.us help manage in...
Kathy J. Lee