Sciweavers

671 search results - page 101 / 135
» On Observing and Constraining Active Systems
Sort
View
104
Voted
CHI
2007
ACM
16 years 1 months ago
Biases in human estimation of interruptibility: effects and implications for practice
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Daniel Avrahami, James Fogarty, Scott E. Hudson
97
Voted
CHI
2009
ACM
15 years 7 months ago
Awareness, training and trust in interaction with adaptive spam filters
Even though adaptive (trainable) spam filters are a common example of systems that make (semi-)autonomous decisions on behalf of the user, trust in these filters has been underexp...
Henriette S. M. Cramer, Vanessa Evers, Maarten van...
108
Voted
UIC
2009
Springer
15 years 7 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
97
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
Performance Analysis of Anonymous Communication Channels Provided by Tor
— Providing anonymity for end-users on the Internet is a very challenging and difficult task. There are currently only a few systems that are of practical relevance for the prov...
Andriy Panchenko, Lexi Pimenidis, Johannes Renner
111
Voted
IWPC
2008
IEEE
15 years 7 months ago
What's a Typical Commit? A Characterization of Open Source Software Repositories
The research examines the version histories of nine open source software systems to uncover trends and characteristics of how developers commit source code to version control syst...
Abdulkareem Alali, Huzefa H. Kagdi, Jonathan I. Ma...