Sciweavers

2912 search results - page 386 / 583
» A Study of Collaboration in Software Design
Sort
View
RECSYS
2009
ACM
15 years 8 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
ITICSE
2010
ACM
15 years 8 months ago
PhidgetLab: crossing the border from virtual to real-world objects
Teaching pupils the ideas behind objects in programming languages can be difficult since these concepts are mostly and not comprehensible at first sight. Etoys as a visual progra...
Michael Haupt, Michael Perscheid, Robert Hirschfel...
CANDT
2009
15 years 7 months ago
Active artifacts as bridges between context and community knowledge sources
The aim of the paper is twofold: i) understanding how to provide additional information that is reflective of current organizational context in knowledge production and use; ii) p...
Federico Cabitza, Carla Simone
CHI
2010
ACM
15 years 7 months ago
Across boundaries of influence and accountability: the multiple scales of public sector information systems
The use of ICTs in the public sector has long been touted for its potential to transform the institutions that govern and provide social services. The focus, however, has largely ...
Christopher A. Le Dantec, W. Keith Edwards
CSCW
2008
ACM
15 years 5 months ago
Transactive memory in trauma resuscitation
This paper describes an ethnographic study conducted to explore the possibilities for future design and development of technological support for trauma teams. We videotaped 10 tra...
Aleksandra Sarcevic, Ivan Marsic, Michael E. Lesk,...