Sciweavers

422 search results - page 40 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
CHI
2007
ACM
16 years 7 days ago
Home networking and HCI: what hath god wrought?
For much of the industrialized world, network connectivity in the home is commonplace. Despite the large number of networked homes, even the most technically savvy people can have...
Erika Shehan, W. Keith Edwards
WWW
2011
ACM
14 years 6 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
ECIS
2003
15 years 1 months ago
Networks as alternative forms of organization: some critical remarks
This paper claims that in its current use the term ‘network’ represents no more than a suggestive image of organizing in an age of spectacular context-crossing electronic tran...
Jannis Kallinikos
CHI
2009
ACM
16 years 13 days ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios
ASUNAM
2009
IEEE
15 years 6 months ago
Models of Communication Dynamics for Simulation of Information Diffusion
—We study information diffusion in real-life and synthetic dynamic networks, using well known threshold and cascade models of diffusion. Our test-bed is the communication network...
Konstantin Mertsalov, Malik Magdon-Ismail, Mark K....