Sciweavers

278 search results - page 34 / 56
» User Configuration of Activity Awareness
Sort
View
TELSYS
2010
147views more  TELSYS 2010»
14 years 6 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
CVPR
2005
IEEE
16 years 1 months ago
Optimal Sub-Shape Models by Minimum Description Length
Active shape models are a powerful and widely used tool to interpret complex image data. By building models of shape variation they enable search algorithms to use a priori knowle...
Georg Langs, Philipp Peloschek, Horst Bischof
CHI
2001
ACM
16 years 3 days ago
The notification collage: posting information to public and personal displays
The Notification Collage (NC) is a groupware system where distributed and co-located colleagues comprising a small community post media elements onto a real-time collaborative sur...
Saul Greenberg, Michael Rounding
CSCW
2012
ACM
13 years 7 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
CSCW
2004
ACM
15 years 5 months ago
Field studies of computer system administrators: analysis of system management tools and practices
Computer system administrators are the unsung heroes of the information age, working behind the scenes to configure, maintain, and troubleshoot the computer infrastructure that un...
Rob Barrett, Eser Kandogan, Paul P. Maglio, Eben M...