Sciweavers

169 search results - page 25 / 34
» Malicious interface design: exploiting the user
Sort
View
CSCW
2008
ACM
14 years 11 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
ISM
2008
IEEE
163views Multimedia» more  ISM 2008»
15 years 3 months ago
Cocktail Party on the Mobile
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...
Kwan Hong Lee, Andrew Lippman, Thiago Santos
NATO
1993
15 years 1 months ago
METU Object-Oriented DBMS
METU Object-Oriented DBMS 1 includes the implementation of a database kernel, an object-oriented SQL-like language and a graphical user interface. Kernel functions are divided bet...
Asuman Dogac, Cetin Ozkan, Ismailcem Budak Arpinar...
WWW
2004
ACM
15 years 10 months ago
Event synchronization for interactive cyberdrama generation on the web: a distributed approach
The digital generation of a story in which users have influence over the narrative is emerging as an exciting example of computer-based interactive entertainment. Interactive stor...
Stefano Ferretti, Marco Roccetti
84
Voted
SSD
2007
Springer
189views Database» more  SSD 2007»
15 years 3 months ago
Collaborative Spatial Data Sharing Among Mobile Lightweight Devices
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...