Sciweavers

9575 search results - page 1800 / 1915
» Exploring user experience in
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 3 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
NOSSDAV
2009
Springer
14 years 3 months ago
Web 2.0 traffic measurement: analysis on online map applications
In recent years, web based online map applications have been getting more and more popular, such as Google Maps, Yahoo Maps. Many new Web 2.0 techniques such as mash-up and AJAX w...
Song Lin, Zhiguo Gao, Ke Xu
PPDP
2009
Springer
14 years 3 months ago
Automatic refactoring of Erlang programs
This paper describes the design goals and current status of tidier, a software tool that tidies Erlang source code, making it cleaner, simpler, and often also more efficient. In ...
Konstantinos F. Sagonas, Thanassis Avgerinos
GROUP
2009
ACM
14 years 3 months ago
Effects of feedback and peer pressure on contributions to enterprise social media
Increasingly, large organizations are experimenting with internal social media (e.g., blogs, forums) as a platform for widespread distributed collaboration. Contributions to their...
Michael J. Brzozowski, Thomas Sandholm, Tad Hogg
IMC
2009
ACM
14 years 3 months ago
Network level footprints of facebook applications
With over half a billion users, Online Social Networks (OSNs) are the major new applications on the Internet. Little information is available on the network impact of OSNs, althou...
Atif Nazir, Saqib Raza, Dhruv Gupta, Chen-Nee Chua...
« Prev « First page 1800 / 1915 Last » Next »