Sciweavers

344 search results - page 67 / 69
» Effects of intelligent notification management on users and ...
Sort
View
DRM
2006
Springer
13 years 11 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
ATAL
2008
Springer
13 years 9 months ago
Modeling parallel and reactive empathy in virtual agents: an inductive approach
Humans continuously assess one another's situational context, modify their own affective state, and then respond based on these outcomes through empathetic expression. Virtua...
Scott W. McQuiggan, Jennifer L. Robison, Robert Ph...
HICSS
2003
IEEE
174views Biometrics» more  HICSS 2003»
14 years 25 days ago
XyberScout: A Platform for the Efficient Construction of Mobile Location Aware Information Systems
For many years mobile visitor information systems for museums or exhibitions are a topic of research. Research prototypes aim to provide the user with powerful means for organizin...
Gerald Bieber, Rüdiger Ide
CIKM
2008
Springer
13 years 9 months ago
Dr. Searcher and Mr. Browser: a unified hyperlink-click graph
We introduce a unified graph representation of the Web, which includes both structural and usage information. We model this graph using a simple union of the Web's hyperlink ...
Barbara Poblete, Carlos Castillo, Aristides Gionis
GPCE
2007
Springer
14 years 1 months ago
Simple and safe SQL queries with c++ templates
Most software applications use a relational database for data management and storage. Interaction with such a database is often done by letting the program construct strings with ...
Joseph Gil, Keren Lenz