Sciweavers

5499 search results - page 1089 / 1100
» Generalized Rewrite Theories
Sort
View
CHI
2011
ACM
12 years 11 months ago
Should I open this email?: inbox-level cues, curiosity and attention to email
The quantity of email people receive each day can be overwhelming. Previous research suggests that when handling email, individuals prioritize certain messages for attention over ...
Jaclyn Wainer, Laura Dabbish, Robert Kraut
CHI
2011
ACM
12 years 11 months ago
When designing usability questionnaires, does it hurt to be positive?
When designing questionnaires there is a tradition of including items with both positive and negative wording to minimize acquiescence and extreme response biases. Two disadvantag...
Jeff Sauro, James R. Lewis
CHI
2011
ACM
12 years 11 months ago
Starcraft from the stands: understanding the game spectator
Video games are primarily designed for the players. However, video game spectating is also a popular activity, boosted by the rise of online video sites and major gaming tournamen...
Gifford Cheung, Jeff Huang
CODASPY
2011
12 years 11 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
COMGEO
2011
ACM
12 years 11 months ago
Physical world as an internet of things
ABSTRACT . Categories and Subject Descriptors K. Computing Milieux K.m MISCELLANEOUS General Terms Theory Keywords Cyber-physics, Internet of Things, Quantum computing Cloud Comput...
Simon Berkovich
« Prev « First page 1089 / 1100 Last » Next »