Sciweavers

4419 search results - page 812 / 884
» Social recommender systems
Sort
View
CHIMIT
2007
ACM
15 years 2 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
DPPI
2007
ACM
15 years 2 months ago
My agent as myself or another: effects on credibility and listening to advice
Abstract. People consider other people who resemble them to be more persuasive. Users may consider embodied conversational agents, or ECAs, to be more persuasive if the agents rese...
Ian Li, Jodi Forlizzi, Anind K. Dey, Sara B. Kiesl...
PODC
2010
ACM
15 years 2 months ago
Brief announcement: improving social-network-based sybil-resilient node admission control
We present Gatekeeper, a decentralized protocol that performs Sybil-resilient node admission control based on a social network. Gatekeeper can admit most honest nodes while limiti...
Nguyen Tran, Jinyang Li, Lakshminarayanan Subraman...
HRI
2007
ACM
15 years 2 months ago
Robot expressionism through cartooning
We present a new technique for human-robot interaction called robot expressionism through cartooning. We suggest that robots utilise cartoon-art techniques such as simplified and ...
James Everett Young, Min Xin, Ehud Sharlin
GIS
2009
ACM
15 years 2 months ago
Dynamic network data exploration through semi-supervised functional embedding
The paper presents a framework for semi-supervised nonlinear embedding methods useful for exploratory analysis and visualization of spatio-temporal network data. The method provid...
Alexei Pozdnoukhov