Sciweavers

1644 search results - page 54 / 329
» Finding Dominators in Practice
Sort
View
ICDE
2008
IEEE
124views Database» more  ICDE 2008»
14 years 10 months ago
Privacy: Theory meets Practice on the Map
In this paper, we propose the first formal privacy analysis of a data anonymization process known as the synthetic data generation, a technique becoming popular in the statistics c...
Ashwin Machanavajjhala, Daniel Kifer, John M. Abow...
CHI
2007
ACM
14 years 9 months ago
Biases in human estimation of interruptibility: effects and implications for practice
People have developed a variety of conventions for negotiating face-to-face interruptions. The physical distribution of teams, however, together with the use of computer-mediated ...
Daniel Avrahami, James Fogarty, Scott E. Hudson
CSCW
2010
ACM
14 years 5 months ago
Egalitarians at the gate: one-sided gatekeeping practices in social media
Although Wikipedia has increasingly attracted attention for its in-depth and timely coverage of breaking news stories, the social dynamics of how Wikipedia editors process breakin...
Brian Keegan, Darren Gergle
CHI
2010
ACM
14 years 3 months ago
Understanding usability practices in complex domains
Although usability methods are widely used for evaluating conventional graphical user interfaces and websites, there is a growing concern that current approaches are inadequate fo...
Parmit K. Chilana, Jacob O. Wobbrock, Andrew J. Ko
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 2 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke