Sciweavers

422 search results - page 70 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
15 years 6 months ago
Mining Graph Evolution Rules
In this paper we introduce graph-evolution rules, a novel type of frequency-based pattern that describe the evolution of large networks over time, at a local level. Given a sequenc...
Michele Berlingerio, Francesco Bonchi, Björn ...
CHI
2010
ACM
15 years 6 months ago
Designing a technological playground: a field study of the emergence of play in household messaging
We present findings from a field study of Wayve, a situated messaging device for the home that incorporates handwriting and photography. Wayve was used by 24 households (some of w...
Siân E. Lindley, Richard H. R. Harper, Abiga...
ACMACE
2009
ACM
15 years 6 months ago
Exposure effect on experience and visual perception in stereoscopic visual presentations
The advent of new technologies in cinema, theatre and virtual reality together with increasing demands for new content, are pushing the boundaries of filmmaking and storytelling t...
Wendy Ann Mansilla, Andrew Perkis, Touradj Ebrahim...
WEBI
2007
Springer
15 years 5 months ago
Flickr: Who is Looking?
This article presents a characterization of user behavior on Flickr, a popular on-line photo sharing service that allows users to store, search, sort and share their photos. Based...
Roelof van Zwol
CSCW
2006
ACM
15 years 5 months ago
Identification of coordination requirements: implications for the Design of collaboration and awareness tools
Task dependencies drive the need to coordinate work activities. We describe a technique for using automatically generated archival data to compute coordination requirements, i.e.,...
Marcelo Cataldo, Patrick Wagstrom, James D. Herbsl...