Sciweavers

251 search results - page 27 / 51
» Privacy and HCI: methodologies for studying privacy issues
Sort
View
SP
2000
IEEE
15 years 4 months ago
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure
Nested certification is a methodology for efficient certificate path verification. Nested certificates can be used together with classical certificates in the Public Key Infrastru...
Albert Levi, M. Ufuk Çaglayan
WWW
2007
ACM
16 years 14 days ago
Communication as information-seeking: the case for mobile social software for developing regions
In this paper, we describe several findings from a multi-year, multi-method study of how information and communication technologies have been adopted and adapted in Central Asia. ...
Beth E. Kolko, Emma J. Rose, Erica J. Johnson
HAIS
2009
Springer
15 years 4 months ago
An Evolutionary Ensemble-Based Method for Rule Extraction with Distributed Data
This paper presents a methodology for knowledge discovery from inherently distributed data without moving it from its original location, completely or partially, to other locations...
Diego M. Escalante, Miguel Angel Rodriguez, Antoni...
CSCW
2006
ACM
15 years 5 months ago
Moving office: inhabiting a dynamic building
Mixed Reality Architecture (MRA) supports distributed teams in their everyday work activities by linking multiple physical spaces across a shared three-dimensional virtual world. ...
Holger Schnädelbach, Alan Penn, Phil Steadman...
CHI
2006
ACM
16 years 6 days ago
Everyday practices with mobile video telephony
The mobile phone allowed people to communicate when and where they wanted, dramatically changing how audio telephony was integrated into daily life. With video telephony services ...
Kenton O'Hara, Alison Black, Matthew Lipson