Sciweavers

3544 search results - page 605 / 709
» Information Security in Open Systems
Sort
View
70
Voted
CHI
2008
ACM
15 years 11 months ago
The cost of interrupted work: more speed and stress
We performed an empirical study to investigate whether the context of interruptions makes a difference. We found that context does not make a difference but surprisingly, people c...
Gloria Mark, Daniela Gudith, Ulrich Klocke
CHI
2008
ACM
15 years 11 months ago
In-car gps navigation: engagement with and disengagement from the environment
Although in-car GPS navigation technology is proliferating, it is not well understood how its use alters the ways people interpret their environment and navigate through it. We ar...
Gilly Leshed, Theresa Velden, Oya Rieger, Blazej J...

Publication
104views
15 years 8 months ago
Finding My Needle in the Haystack: Effective Personalized Re-ranking of Search Results in Prospector
Abstract. This paper provides an overview of Prospector, a personalized Internet meta-search engine, which utilizes a combination of ontological information, ratings-based models o...
Florian König, Lex van Velsen, Alexandros Par...
HICSS
2009
IEEE
74views Biometrics» more  HICSS 2009»
15 years 6 months ago
Unleashing Mobility in the Organization: A Time-Geography Perspective
The increased fluidity and agility of organizations demand the smooth mediation of information technology (IT) between user and task. As rigid hierarchies are giving way to open, ...
Douglas M. Schutz, Yong-Young Kim, Youngjin Yoo
EDOC
2009
IEEE
15 years 5 months ago
Using Enterprise Architecture Management Patterns to Complement TOGAF
—The design of an Enterprise Architecture (EA) management function for an enterprise is no easy task. Various frameworks exist as well as EA management tools, which promise to de...
Sabine Buckl, Alexander M. Ernst, Florian Matthes,...