Sciweavers

1663 search results - page 284 / 333
» Privacy and Identity Management
Sort
View
CSCW
2011
ACM
14 years 6 months ago
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment
This paper reports on an ethnographic study of the technology-enabled behavior that took place amongst a citizen population living in a conflict zone. We interviewed 65 Iraqi citi...
Bryan Semaan, Gloria Mark
ISCI
2011
14 years 6 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
COR
2011
14 years 6 months ago
Online scheduling of weighted equal-length jobs with hard deadlines on parallel machines
We consider the problem of scheduling a maximum profit selection of equal length jobs on m identical machines. Jobs arrive online over time and the goal is to determine a non-pre...
Sven Oliver Krumke, Alfred Taudes, Stephan Westpha...
CHI
2011
ACM
14 years 3 months ago
Competing online viewpoints and models of chronic illness
People with chronic health problems use online resources to understand and manage their condition, but many such resources can present competing and confusing viewpoints. We surve...
Jennifer Mankoff, Kateryna Kuksenok, Sara B. Kiesl...
ICONFERENCE
2012
13 years 7 months ago
No forests without trees: particulars and patterns in visualizing personal communication
When people use visualizations of conversational archives, they typically reflect on particular events, rather than patterns of activity over time. We explore whether this is a fu...
Ou Jie Zhao, Tiffany Ng, Dan Cosley