Sciweavers

7962 search results - page 1457 / 1593
» Conceptions of information science
Sort
View
129
Voted
CHI
2007
ACM
16 years 5 months ago
Noticing notice: a large-scale experiment on the timing of software license agreements
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report ...
Nathaniel Good, Jens Grossklags, Deirdre K. Mullig...
CHI
2004
ACM
16 years 5 months ago
Physically large displays improve path integration in 3D virtual navigation tasks
Previous results have shown that users perform better on spatial orientation tasks involving static 2D scenes when working on physically large displays as compared to small ones. ...
Desney S. Tan, Darren Gergle, Peter Scupelli, Rand...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
16 years 4 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah
EDBT
2008
ACM
166views Database» more  EDBT 2008»
16 years 4 months ago
Social ties and their relevance to churn in mobile telecom networks
Social Network Analysis has emerged as a key paradigm in modern sociology, technology, and information sciences. The paradigm stems from the view that the attributes of an individ...
Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan,...
ICSE
2005
IEEE-ACM
16 years 4 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
« Prev « First page 1457 / 1593 Last » Next »