Managing and communicating information and knowledge with patterns entail a multitude of assumptions, interests, and validity claims. Patterns are socially constructed, and they m...
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...
The Internet has already connected people and established a mature online community. The use of WWW is also in the main stream of disseminating one’s information and services. In...
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In parti...
Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authen...