Sciweavers

706 search results - page 85 / 142
» Reporting Flock Patterns
Sort
View
ICSE
2004
IEEE-ACM
14 years 10 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
CHI
2010
ACM
14 years 4 months ago
A study of tabbed browsing among mozilla firefox users
We present a study which investigated how and why users of Mozilla Firefox use multiple tabs and windows during web browsing. The detailed web browsing usage of 21 participants wa...
Patrick Dubroy, Ravin Balakrishnan
CHI
2010
ACM
14 years 4 months ago
Measuring environments for public displays: a space syntax approach
This paper reports on an on-going project, which is investigating the role that location plays in the visibility of information presented on a public display. Spatial measures are...
Sheep N. Dalton, Paul Marshall, Ruth Conroy Dalton
WWW
2010
ACM
14 years 4 months ago
What is disputed on the web?
We present a method for automatically acquiring of a corpus of disputed claims from the web. We consider a factual claim to be disputed if a page on the web suggests both that the...
Rob Ennals, Dan Byler, John Mark Agosta, Barbara R...
HRI
2009
ACM
14 years 4 months ago
Robots in the wild: understanding long-term use
It has long been recognized that novelty effects exist in the interaction with technologies. Despite this recognition, we still know little about the novelty effects associated wi...
Ja-Young Sung, Henrik I. Christensen, Rebecca E. G...