Sciweavers

1644 search results - page 54 / 329
» Finding Dominators in Practice
Sort
View
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
16 years 4 months ago
Privacy: Theory meets Practice on the Map
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics c...
Ashwin Machanavajjhala, Daniel Kifer, John M. Abow...
CHI
2007
ACM
16 years 3 months ago
Biases in human estimation of interruptibility: effects and implications for practice
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Daniel Avrahami, James Fogarty, Scott E. Hudson
CSCW
2010
ACM
16 years 11 hour ago
Egalitarians at the gate: one-sided gatekeeping practices in social media
Although Wikipedia has increasingly attracted attention for its in-depth and timely coverage of breaking news stories, the social dynamics of how Wikipedia editors process breakin...
Brian Keegan, Darren Gergle
CHI
2010
ACM
15 years 10 months ago
Understanding usability practices in complex domains
Although usability methods are widely used for evaluating conventional graphical user interfaces and websites, there is a growing concern that current approaches are inadequate fo...
Parmit K. Chilana, Jacob O. Wobbrock, Andrew J. Ko
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 9 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke