Sciweavers

1674 search results - page 268 / 335
» Learning Actions From the Web
Sort
View
CIKM
2010
Springer
14 years 8 months ago
Understanding retweeting behaviors in social networks
Retweeting is an important action (behavior) on Twitter, indicating the behavior that users re-post microblogs of their friends. While much work has been conducted for mining text...
Zi Yang, Jingyi Guo, Keke Cai, Jie Tang, Juanzi Li...
NORDICHI
2004
ACM
15 years 3 months ago
Mobile probes
This paper describes a new digital user study tool called Mobile Probes. Mobile Probes arose from a need to develop contextual and dynamic self-documenting tools for studying peop...
Sami Hulkko, Tuuli Mattelmäki, Katja Virtanen...
ADBIS
2001
Springer
108views Database» more  ADBIS 2001»
15 years 2 months ago
An RMM-Based Methodology for Hypermedia Presentation Design
Due to the rapid growth of the Web, there is an increasing need for methodologies that support the design of Web-based Information Systems (WIS). After investigating the applicatio...
Flavius Frasincar, Geert-Jan Houben, Richard Vdovj...
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
14 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
IMCS
2007
78views more  IMCS 2007»
14 years 9 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri