Sciweavers

2648 search results - page 428 / 530
» Human Factors In Computer Security
Sort
View
KDD
2009
ACM
183views Data Mining» more  KDD 2009»
15 years 4 months ago
Financial incentives and the "performance of crowds"
The relationship between financial incentives and performance, long of interest to social scientists, has gained new relevance with the advent of web-based “crowd-sourcing” mo...
Winter A. Mason, Duncan J. Watts
HAPTICS
2009
IEEE
15 years 4 months ago
Virtual active touch: Perceived roughness through a pointing-stick-type tactile interface
For realizing a tactile display for a handheld device, active touch movement should be represented on a small interface. We propose the addition of a tactile feedback mechanism fo...
Takahiro Yamauchi, Masashi Konyo, Shogo Okamoto, S...
CIKM
2009
Springer
15 years 4 months ago
An analysis of information diffusion in the blog world
In the blog world, bloggers produce information, establish relationships with other bloggers in order to exchange information, and form a blog network, an online social network. I...
Yong-Suk Kwon, Sang-Wook Kim, Sunju Park
NOSSDAV
2009
Springer
15 years 4 months ago
Fine-grained scalable streaming from coarse-grained videos
Scalable video is an attractive option for adapting the bandwidth consumption of streaming video to the available bandwidth. Fine-grained scalability can adapt most closely to the...
Pengpeng Ni, Alexander Eichhorn, Carsten Griwodz, ...
CANDC
2009
ACM
15 years 4 months ago
Discovery is never by chance: designing for (un)serendipity
Serendipity has a long tradition in the history of science as having played a key role in many significant discoveries. Computer scientists, valuing the role of serendipity in dis...
Paul André, m. c. schraefel, Jaime Teevan, ...