Sciweavers

10 search results - page 2 / 2
» Patterns and Practices in How Information Technology Spread ...
Sort
View
HICSS
2006
IEEE
111views Biometrics» more  HICSS 2006»
14 years 25 days ago
Can Government Be a Good eBayer? The Use of Online Auctions in the Sale of Surplus Property
E-commerce, and online auctions in particular, represent important examples of how information and communication technologies have been employed by public organizations to gain be...
Enrico Ferro, Lucy Dadayan
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
13 years 11 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
W4A
2005
ACM
14 years 10 days ago
What's the web like if you can't see it?
Awareness of Web accessibility is spreading all over the world among Web designers and developers, due to regulations such as the US law called Section 508 and guidelines like the...
Chieko Asakawa
HT
2010
ACM
13 years 12 months ago
Conversational tagging in twitter
Users on Twitter, a microblogging service, started the phenomenon of adding tags to their messages sometime around February 2008. These tags are distinct from those in other Web 2...
Jeff Huang, Katherine M. Thornton, Efthimis N. Eft...
ACMDIS
2010
ACM
13 years 7 months ago
Design from the everyday: continuously evolving, embedded exploratory prototypes
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...
Clint Heyer, Margot Brereton