Sciweavers

897 search results - page 7 / 180
» Identity: How to name it, How to find it
Sort
View
CHI
2011
ACM
13 years 5 days ago
Donate for credibility: how contribution incentives can improve credibility
This study explores whether certain contribution incentives for online user-generated content can undermine or enhance contributor’s credibility. Through an online experiment, w...
Gary Hsieh, Scott E. Hudson, Robert E. Kraut
SIGSOFT
2006
ACM
14 years 9 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken
UIST
1998
ACM
14 years 25 days ago
Informative Things: How to Attach Information to the Real World
We describe a new method and implementation for managing information through the use of physical objects. In today’s networked world, the trend is toward working in a global vir...
Rob Barrett, Paul P. Maglio
IDA
2009
Springer
14 years 3 months ago
How to Control Clustering Results? Flexible Clustering Aggregation
One of the most important and challenging questions in the area of clustering is how to choose the best-fitting algorithm and parameterization to obtain an optiml clustering for t...
Martin Hahmann, Peter Benjamin Volk, Frank Rosenth...
IEEEARES
2007
IEEE
14 years 2 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...