Sciweavers

2846 search results - page 472 / 570
» Personalization of a Trust Network
Sort
View
95
Voted
CHI
2010
ACM
15 years 7 months ago
Blogging in a region of conflict: supporting transition to recovery
The blogosphere is changing how people experience war and conflict. We conducted an analysis of 125 blogs written by Iraqi citizens experiencing extreme disruption in their countr...
Ban Al-Ani, Gloria Mark, Bryan Semaan
CHI
2010
ACM
15 years 7 months ago
Experience in social affective applications: methodologies and case study
New forms of social affective applications are emerging, bringing with them challenges in design and evaluation. We report on one such application, conveying wellbeing for both pe...
Paul André, m. c. schraefel, Alan J. Dix, R...
86
Voted
CSE
2009
IEEE
15 years 7 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
89
Voted
CSE
2009
IEEE
15 years 7 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 7 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson