Sciweavers

1251 search results - page 111 / 251
» Management of User Preferences in Data Intensive Application...
Sort
View
SSDBM
2010
IEEE
166views Database» more  SSDBM 2010»
15 years 8 months ago
Bridging Workflow and Data Provenance Using Strong Links
Abstract. As scientists continue to migrate their work to computational methods, it is important to track not only the steps involved in the computation but also the data consumed ...
David Koop, Emanuele Santos, Bela Bauer, Matthias ...
118
Voted
CHI
2003
ACM
16 years 4 months ago
Leaders leading? a shift in technology adoption
In the past, most early hands-on users of interactive software in organizations were individual contributors. Managers as early adopters is a new trend with significant implicatio...
Jonathan Grudin
FAST
2009
15 years 1 months ago
The Case for Browser Provenance
In our increasingly networked world, web browsers are important applications. Originally an interface tool for accessing distributed documents, browsers have become ubiquitous, in...
Daniel W. Margo, Margo I. Seltzer
WISE
2009
Springer
16 years 1 months ago
Facing Tagging Data Scattering
Web2.0 has brought tagging at the forefront of user practises for organizing and locating resources. Unfortunately, these tagging efforts suffer from a main drawback: lack of inter...
Oscar Díaz, Jon Iturrioz, Cristóbal ...
JAIR
2010
143views more  JAIR 2010»
15 years 2 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz