Sciweavers

2891 search results - page 101 / 579
» More or Less Elaborate
Sort
View
86
Voted
INTERACT
2007
15 years 11 days ago
Do I Do What I Say?: Observed Versus Stated Privacy Preferences
Abstract. This paper examines the use of surveys in measuring privacy concerns in ubiquitous computing environments. Two evaluation techniques are used to study the privacy concern...
Kay Connelly, Ashraf Khalil, Yong Liu
79
Voted
AAAI
2004
15 years 10 days ago
Domain Transmutation in Constraint Satisfaction Problems
We study local interchangeability of values in constraint networks based on a new approach where a single value in the domain of a variable can be treated as a combination of &quo...
James Bowen, Chavalit Likitvivatanavong
80
Voted
ECIS
2004
15 years 10 days ago
When Systems Loose their Identity
This paper reports a longitudinal study of the design and implementation of a Web-based groupware application. We studied the development of three versions of the application, and...
Jorgen P. Bansler, Erling C. Havn
106
Voted
ECIR
2006
Springer
15 years 10 days ago
The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria
This paper presents an experimental study on the effect of topic familiarity on the assessment behaviour of online searchers. In particular we investigate the effect of topic famil...
Lei Wen, Ian Ruthven, Pia Borlund
ICWN
2004
15 years 10 days ago
Improvements to Location-Aided Routing Through Directional Count Restrictions
We present an effective way to improve the quality of unicast routes determined by the LAR Box method. Our method uses the location information acquired by LAR itself to determine ...
Michael Colagrosso, Nathan Enochs, Tracy Camp