Sciweavers

515 search results - page 25 / 103
» Automated Social Network Analysis for Collaborative Work
Sort
View
ISI
2008
Springer
13 years 7 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
CSCW
2012
ACM
12 years 3 months ago
Towards self-optimizing collaborative systems
Two important performance metrics in collaborative systems are local and remote response times. Previous analytical and simulation work has shown that these response times depend ...
Sasa Junuzovic, Prasun Dewan
CHI
2009
ACM
14 years 8 months ago
In CMC we trust: the role of similarity
This paper examines how different forms of linguistic similarity in a text-chat environment relate to the establishment of interpersonal trust. Sixty-two pairs played an iterative...
Lauren E. Scissors, Alastair J. Gill, Kathleen Ger...
IVS
2008
147views more  IVS 2008»
13 years 7 months ago
Design considerations for collaborative visual analytics
Information visualization leverages the human visual system to support the process of sensemaking, in which information is collected, organized, and analyzed to generate knowledge...
Jeffrey Heer, Maneesh Agrawala
CCS
2010
ACM
13 years 5 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...