Sciweavers

287 search results - page 53 / 58
» How it works: a field study of non-technical users interacti...
Sort
View
CHI
2010
ACM
13 years 7 months ago
America is like Metamucil: fostering critical and creative thinking about metaphor in political blogs
Blogs are becoming an increasingly important medium-socially, academically, and politically. Much research has involved analyzing blogs, but less work has considered how such anal...
Eric P. S. Baumer, Jordan Sinclair, Bill Tomlinson
CHI
2009
ACM
14 years 8 months ago
Waterhouse: enabling secure e-mail with social networking
We present Waterhouse, a system for sending and receiving cryptographically protected electronic mail ("secure e-mail"). We show how an existing e-mail interface can be ...
Alex P. Lambert, Stephen M. Bezek, Karrie Karahali...
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
SIGSOFT
2006
ACM
14 years 1 months ago
Using task context to improve programmer productivity
When working on a large software system, a programmer typically spends an inordinate amount of time sifting through thousands of artifacts to find just the subset of information n...
Mik Kersten, Gail C. Murphy
EDM
2010
248views Data Mining» more  EDM 2010»
13 years 9 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...