Sciweavers

640 search results - page 88 / 128
» Access Control for Active Spaces
Sort
View
NRHM
2000
149views more  NRHM 2000»
13 years 8 months ago
Navigable history: a reader's view of writer's time
Collecting, analyzing, and sharing information via a hypertext results in the continuous modification of information content over a long period of time. Such tasks will benefit fr...
Frank M. Shipman III, Hao-wei Hsieh
PERCOM
2011
ACM
13 years 16 days ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
CHI
2003
ACM
14 years 9 months ago
Mobile computing in the retail arena
Although PDAs typically run applications in a "standalone" mode, they are increasingly equipped with wireless communications, which makes them useful in new domains. Thi...
Erica Newcomb, Toni Pashley, John T. Stasko
IUI
2009
ACM
14 years 5 months ago
Understanding the intent behind mobile information needs
Mobile phones are becoming increasingly popular as a means of information access while on-the-go. Mobile users are likely to be interested in locating different types of content. ...
Karen Church, Barry Smyth
CHI
2010
ACM
14 years 3 months ago
Student socialization in the age of facebook
Most research regarding online social networks such as Facebook, MySpace, Linked-In and Friendster has looked at these networks in terms of activity within the online network, suc...
Louise Barkhuus, Juliana Tashiro