Sciweavers

1618 search results - page 155 / 324
» Privacy Interfaces for Information Management
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
The evolution of storage service providers: techniques and challenges to outsourcing storage
As enterprise storage needs grow, it is challenging to manage storage systems. The costs of locally managing, supporting, and maintaining resilience in storage systems has skyrock...
Ragib Hasan, William Yurcik, Suvda Myagmar
CHI
2008
ACM
14 years 9 months ago
OpenMessenger: gradual initiation of interaction for distributed workgroups
The initiation of interaction in face-to-face environments is a gradual process, and takes place in a rich information landscape of awareness, attention, and social signals. One o...
Jeremy P. Birnholtz, Carl Gutwin, Gonzalo Ramos, M...
ACSAC
2005
IEEE
14 years 2 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
HUC
2010
Springer
13 years 10 months ago
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing
The popularity of micro-blogging has made generalpurpose information sharing a pervasive phenomenon. This trend is now impacting location sharing applications (LSAs) such that use...
Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P...
CHI
2003
ACM
14 years 9 months ago
Personal media exploration with semantic regions
Computer users deal with large amount of personal media data and they often face problems in managing and exploring them. The paper presents an innovative approach, Semantic Regio...
Hyunmo Kang