Sciweavers

3451 search results - page 600 / 691
» Collaborative attack modeling
Sort
View
CSCW
2010
ACM
14 years 4 months ago
On the "localness" of user-generated content
The “localness” of participation in repositories of usergenerated content (UGC) with geospatial components has been cited as one of UGC’s greatest benefits. However, the deg...
Brent Hecht, Darren Gergle
CHI
2010
ACM
14 years 2 months ago
Blogging in a region of conflict: supporting transition to recovery
The blogosphere is changing how people experience war and conflict. We conducted an analysis of 125 blogs written by Iraqi citizens experiencing extreme disruption in their countr...
Ban Al-Ani, Gloria Mark, Bryan Semaan
CHI
2010
ACM
14 years 2 months ago
Understanding usability practices in complex domains
Although usability methods are widely used for evaluating conventional graphical user interfaces and websites, there is a growing concern that current approaches are inadequate fo...
Parmit K. Chilana, Jacob O. Wobbrock, Andrew J. Ko
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 2 months ago
Identity Inference as a Privacy Risk in Computer-Mediated Communication
New Web 2.0 applications, with their emphasis on collaboration and communication, hold the promise of major advances in social connectivity and coordination; however, they also in...
Sara Motahari, Sotirios G. Ziavras, Richard P. Sch...
KBSE
2009
IEEE
14 years 2 months ago
Design Rule Hierarchies and Parallelism in Software Development Tasks
—As software projects continue to grow in scale, being able to maximize the work that developers can carry out in parallel as a set of concurrent development tasks, without incur...
Sunny Wong, Yuanfang Cai, Giuseppe Valetto, Georgi...