Sciweavers

2648 search results - page 508 / 530
» Human Factors In Computer Security
Sort
View
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
15 years 7 months ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...
IUI
2009
ACM
15 years 6 months ago
What were you thinking?: filling in missing dataflow through inference in learning from demonstration
Recent years have seen a resurgence of interest in programming by demonstration. As end users have become increasingly sophisticated, computer and artificial intelligence technolo...
Melinda T. Gervasio, Janet L. Murdock
CSCW
2010
ACM
15 years 6 months ago
Are you having difficulty?
It would be useful if software engineers/instructors could be aware that remote team members/students are having difficulty with their programming tasks. We have developed an appr...
Jason Carter, Prasun Dewan
CSCW
2010
ACM
15 years 6 months ago
Communication, collaboration, and bugs: the social nature of issue tracking in small, collocated teams
Issue tracking systems help organizations manage issue reporting, assignment, tracking, resolution, and archiving. Traditionally, it is the Software Engineering community that res...
Dane Bertram, Amy Voida, Saul Greenberg, Robert Wa...
CSCW
2010
ACM
15 years 6 months ago
What's it worth to you?: the costs and affordances of CMC tools to asian and american users
In recent years, a growing number of studies examining how culture shapes computer-mediated communication (CMC) have appeared in the CHI and CSCW literature. Findings from these s...
Leslie D. Setlock, Susan R. Fussell