Sciweavers

237 search results - page 38 / 48
» Social Knowledge and Social Action: Heterogeneity in Practic...
Sort
View
CHIMIT
2007
ACM
15 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
GROUP
2009
ACM
15 years 4 months ago
Locating patient expertise in everyday life
Coping with a new health issue often requires individuals to acquire knowledge and skills to manage personal health. Many patients turn to one another for experiential expertise o...
Andrea Civan, David W. McDonald, Kenton T. Unruh, ...
DIGRA
2005
Springer
15 years 3 months ago
A Sociotechnical Conjecture about the Context and Development of Multiplayer Online Game Experiences
The advent of multiplayer online games brings new actors into the development scene and redefines traditional roles and interactions. Anchored on studies of the role of context in...
Licinio Roque
84
Voted
ATAL
2010
Springer
14 years 10 months ago
Finding approximate competitive equilibria: efficient and fair course allocation
In the course allocation problem, a university administrator seeks to efficiently and fairly allocate schedules of over-demanded courses to students with heterogeneous preferences...
Abraham Othman, Tuomas Sandholm, Eric Budish
CASCON
2007
105views Education» more  CASCON 2007»
14 years 11 months ago
Discovering the shared understanding dynamics of large software teams
 Reaching project goals demands from team members the creation and communication of detailed and vastly heterogeneous project information. Although no team member needs to know ...
Jorge Aranda, Ramzan Khuwaja, Steve M. Easterbrook