Sciweavers

897 search results - page 7 / 180
» Identity: How to name it, How to find it
Sort
View
CHI
2011
ACM
14 years 5 months ago
Donate for credibility: how contribution incentives can improve credibility
This study explores whether certain contribution incentives for online user-generated content can undermine or enhance contributor’s credibility. Through an online experiment, w...
Gary Hsieh, Scott E. Hudson, Robert E. Kraut
SIGSOFT
2006
ACM
16 years 2 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken
UIST
1998
ACM
15 years 5 months ago
Informative Things: How to Attach Information to the Real World
We describe a new method and implementation for managing information through the use of physical objects. In today’s networked world, the trend is toward working in a global vir...
Rob Barrett, Paul P. Maglio
IDA
2009
Springer
15 years 8 months ago
How to Control Clustering Results? Flexible Clustering Aggregation
One of the most important and challenging questions in the area of clustering is how to choose the best-fitting algorithm and parameterization to obtain an optiml clustering for t...
Martin Hahmann, Peter Benjamin Volk, Frank Rosenth...
IEEEARES
2007
IEEE
15 years 7 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...