Sciweavers

343 search results - page 44 / 69
» The All-In Publication Policy
Sort
View
CHI
2006
ACM
14 years 11 months ago
Tensions in designing capture technologies for an evidence-based care community
Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collecte...
Gillian R. Hayes, Gregory D. Abowd
CHI
2005
ACM
14 years 11 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
CHI
2010
ACM
14 years 5 months ago
Communicating software agreement content using narrative pictograms
This paper presents narrative pictograms, diagrams designed to convey the abstract concepts of a software agreement. Narrative pictograms arose out of a need to increase the chanc...
Matthew Kay, Michael Terry
EUROSEC
2010
ACM
14 years 5 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
SAC
2010
ACM
14 years 5 months ago
Content cloaking: preserving privacy with Google Docs and other web applications
Web office suites such as Google Docs offer unparalleled collaboration experiences in terms of low software requirements, ease of use, data ubiquity, and availability. When the d...
Gabriele D'Angelo, Fabio Vitali, Stefano Zacchirol...