Sciweavers

524 search results - page 62 / 105
» Why phishing works
Sort
View
WWW
2004
ACM
16 years 15 days ago
Towards the composition of Ad Hoc B2B Applications: Semantics, Properties and Complexity Management
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
Jaime Delgado, Rosa Gil, Zièd Choukair
CHI
2005
ACM
16 years 7 days ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
CHI
2004
ACM
16 years 6 days ago
Think different: increasing online community participation using uniqueness and group dissimilarity
Online communities can help people form productive relationships. Unfortunately, this potential is not always fulfilled: many communities fail, and designers don't have a sol...
Pamela J. Ludford, Dan Cosley, Dan Frankowski, Lor...
68
Voted
ICSE
2003
IEEE-ACM
15 years 12 months ago
On the Uniformity of Software Evolution Patterns
Preparations for Y2K reminded the software engineering community of the extent to which long-lived software systems are embedded in our daily environments. As systems are maintain...
Evelyn J. Barry, Chris F. Kemerer, Sandra Slaughte...
ICSE
2007
IEEE-ACM
15 years 12 months ago
Information Needs in Collocated Software Development Teams
Previous research has documented the fragmented nature of software development work, with frequent interruptions and coordination. To explain this in more detail, we analyzed soft...
Andrew J. Ko, Robert DeLine, Gina Venolia