Sciweavers

471 search results - page 75 / 95
» Social applications: exploring a more secure framework
Sort
View
CSCW
2002
ACM
14 years 11 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...
JCDL
2011
ACM
228views Education» more  JCDL 2011»
14 years 2 months ago
The ownership and reuse of visual media
This paper presents the results of a study of the ownership and reuse of visual media. A survey was administered to 250 social media-savvy respondents to investigate their attitud...
Catherine C. Marshall, Frank M. Shipman III
DIS
2009
Springer
15 years 6 months ago
A Dialectic Approach to Problem-Solving
We analyze the dynamics of problem-solving in a framework which captures two key features of that activity. The first feature is that problem-solving is a social game where a numb...
Éric Martin, Jean Sallantin
ISSA
2004
15 years 1 months ago
An Investigation Into Access Control For Mobile Devices
Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt t...
Stephen Perelson
SIGOPSE
2004
ACM
15 years 5 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase