Sciweavers

169 search results - page 25 / 34
» Malicious interface design: exploiting the user
Sort
View
CSCW
2008
ACM
13 years 9 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
ISM
2008
IEEE
163views Multimedia» more  ISM 2008»
14 years 2 months ago
Cocktail Party on the Mobile
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...
Kwan Hong Lee, Andrew Lippman, Thiago Santos
NATO
1993
13 years 11 months ago
METU Object-Oriented DBMS
METU Object-Oriented DBMS 1 includes the implementation of a database kernel, an object-oriented SQL-like language and a graphical user interface. Kernel functions are divided bet...
Asuman Dogac, Cetin Ozkan, Ismailcem Budak Arpinar...
WWW
2004
ACM
14 years 8 months ago
Event synchronization for interactive cyberdrama generation on the web: a distributed approach
The digital generation of a story in which users have influence over the narrative is emerging as an exciting example of computer-based interactive entertainment. Interactive stor...
Stefano Ferretti, Marco Roccetti
SSD
2007
Springer
189views Database» more  SSD 2007»
14 years 1 months ago
Collaborative Spatial Data Sharing Among Mobile Lightweight Devices
Abstract. Mobile devices are increasingly being equipped with wireless peerto-peer (P2P) networking interfaces, rendering the sharing of data among mobile devices feasible and bene...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...