Sciweavers

809 search results - page 151 / 162
» Social Contexts and Social Pragmatics
Sort
View
SOFTWARE
2008
13 years 7 months ago
What Do We Know about Developer Motivation?
s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
KES
2007
Springer
13 years 7 months ago
KeyGraph-based chance discovery for mobile contents management system
Chance discovery provides a way to find rare but very important events for future decision making. It can be applied to stock market prediction, earthquake alarm, intrusion detect...
Kyung-Joong Kim, Myung-Chul Jung, Sung-Bae Cho
IJMMS
1998
153views more  IJMMS 1998»
13 years 7 months ago
Brahms: simulating practice for work systems design
A continuing problem in business today is the design of human-computer systems that respect how work actually gets done. The overarching context of work consists of activities, wh...
William J. Clancey, Patricia Sachs, Maarten Sierhu...
PIMRC
2010
IEEE
13 years 5 months ago
Contact surround in opportunistic networks
Abstract--Is the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant re...
Nadjet Belblidia, Marcelo Dias de Amorim, Jeremie ...
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 5 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...