Sciweavers

2648 search results - page 406 / 530
» Human Factors In Computer Security
Sort
View
GROUP
2007
ACM
15 years 1 months ago
Searching for experts in the enterprise: combining text and social network analysis
Employees depend on other people in the enterprise for rapid access to important information. But current systems for finding experts do not adequately address the social implicat...
Kate Ehrlich, Ching-Yung Lin, Vicky Griffiths-Fish...
GROUP
2007
ACM
15 years 1 months ago
Knowledge work artifacts: kernel cousins for free/open source software development
Most empirical studies of peer production have focused on the final products of these efforts (such as software in Free/Open Source projects), but there are also many other knowle...
Margaret S. Elliott, Mark S. Ackerman, Walt Scacch...
GROUP
2007
ACM
15 years 1 months ago
Creating, destroying, and restoring value in wikipedia
Wikipedia's brilliance and curse is that any user can edit any of the encyclopedia entries. We introduce the notion of the impact of an edit, measured by the number of times ...
Reid Priedhorsky, Jilin Chen, Shyong K. Lam, Kathe...
ASSETS
2006
ACM
15 years 1 months ago
Where's my stuff?: design and evaluation of a mobile system for locating lost items for the visually impaired
Finding lost items is a common problem for the visually impaired and is something that computing technology can help alleviate. In this paper, we present the design and evaluation...
Julie A. Kientz, Shwetak N. Patel, Arwa Z. Tyebkha...
EICS
2010
ACM
15 years 1 days ago
Xplain: an editor for building self-explanatory user interfaces by model-driven engineering
Modern User Interfaces (UI) must deal with the increasing complexity of applications in terms of functionality as well as new properties as plasticity. The plasticity of a UI deno...
Alfonso García Frey, Gaëlle Calvary, S...