Sciweavers

792 search results - page 106 / 159
» Interview
Sort
View
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
GROUP
2007
ACM
14 years 1 months ago
Identity management: multiple presentations of self in facebook
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This researc...
Joan Morris DiMicco, David R. Millen
HRI
2007
ACM
14 years 1 months ago
Comparing a computer agent with a humanoid robot
HRI researchers interested in social robots have made large investments in humanoid robots. There is still sparse evidence that peoples' responses to robots differ from their...
Aaron Powers, Sara B. Kiesler, Susan R. Fussell, C...
ASWEC
2004
IEEE
14 years 1 months ago
Knowledge Management in Software Engineering - Describing the Process
The management of knowledge and experience are key means by which systematic software development and process improvement occur. Within the domain of Software Engineering (SE), qu...
James Ward, Aybüke Aurum
CHI
2001
ACM
14 years 1 months ago
Automating camera management for lecture room environments
Given rapid improvements in network infrastructure and streaming-media technologies, a large number of corporations and universities are recording lectures and making them availab...
Qiong Liu, Yong Rui, Anoop Gupta, Jonathan J. Cadi...