Sciweavers

2648 search results - page 411 / 530
» Human Factors In Computer Security
Sort
View
ICONFERENCE
2011
14 years 1 months ago
Barriers to the adoption and use of personal health record systems
Personal health records (PHR) have enormous potential to improve both documentation of health information and patient care. The adoption of these systems, however, has been relati...
Leslie S. Liu, Patrick C. Shih, Gillian R. Hayes
CSCW
2012
ACM
13 years 5 months ago
Coordination and beyond: social functions of groups in open content production
We report on a study of the English edition of Wikipedia in which we used a mixed methods approach to understand how nested organizational structures called WikiProjects support c...
Andrea Forte, Niki Kittur, Vanessa Larco, Haiyi Zh...
SOUPS
2009
ACM
15 years 4 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...
CCR
2004
116views more  CCR 2004»
14 years 10 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
15 years 4 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson