Sciweavers

2429 search results - page 346 / 486
» A Requirement Engineering Approach to User Centered Design
Sort
View
AIRWEB
2009
Springer
15 years 11 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer
134
Voted
EICS
2009
ACM
15 years 11 months ago
GT/SD: performance and simplicity in a groupware toolkit
Many tools exist for developing real-time distributed groupware, but most of these tools focus primarily on the performance of the resulting system, or on simplifying the developm...
Brian de Alwis, Carl Gutwin, Saul Greenberg
WIKIS
2010
ACM
15 years 4 months ago
ThinkFree: using a visual Wiki for IT knowledge management in a tertiary institution
We describe ThinkFree, an industrial Visual Wiki application which provides a way for end users to better explore knowledge of IT Enterprise Architecture assets that is held withi...
Christian Hirsch, John G. Hosking, John C. Grundy,...
IEEEARES
2007
IEEE
15 years 11 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
EWHCI
1993
15 years 8 months ago
Applying the Wizard of Oz Technique to the Study of Multimodal Systems
The Wizard of Oz (WOz) technique is an experimental evaluation mechanism. It allows the observation of a user operating an apparently fully functioning system whose missing service...
Daniel Salber, Joëlle Coutaz