Sciweavers

4445 search results - page 159 / 889
» Reflective Authorization Systems
Sort
View
CHI
2010
ACM
15 years 11 months ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
CHI
2010
ACM
15 years 11 months ago
The design of eco-feedback technology
Eco-feedback technology provides feedback on individual or group behaviors with a goal of reducing environmental impact. The history of eco-feedback extends back more than 40 year...
Jon Froehlich, Leah Findlater, James A. Landay
CHI
2010
ACM
15 years 11 months ago
InAir: sharing indoor air quality measurements and visualizations
This paper describes inAir, a tool for sharing measurements and visualizations of indoor air quality within one’s social network. Poor indoor air quality is difficult for humans...
Sunyoung Kim, Eric Paulos
OZCHI
2009
ACM
15 years 11 months ago
Designing situations
This paper extends the analytic framework Suchman used in Plans and Situated Actions by using it as a tool in the design of interactive, immersive environments that rely on human ...
Toni Robertson, Lian Loke
140
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 11 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi