Sciweavers

2678 search results - page 441 / 536
» Voting in social networks
Sort
View
HICSS
2008
IEEE
215views Biometrics» more  HICSS 2008»
13 years 11 months ago
Harry Potter and the Meat-Filled Freezer: A Case Study of Spontaneous Usage of Visualization Tools
This paper is a report on early user activity in Many Eyes, a public web site where users may upload data, create visualizations, and carry on discussions. Since the site launched...
Fernanda B. Viégas, Martin Wattenberg, Matt...
AEI
2007
119views more  AEI 2007»
13 years 10 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
BEHAVIOURIT
2007
91views more  BEHAVIOURIT 2007»
13 years 10 months ago
Reality is our laboratory: communities of practice in applied computer science
This paper presents a longitudinal study of the course ‘High-tech Entrepreneurship and New Media’. The course design is based on socio-cultural theories of learning and consid...
Markus Rohde, Ralf Klamma, Matthias Jarke, Volker ...
CLEIEJ
2008
88views more  CLEIEJ 2008»
13 years 10 months ago
A Trust Model for a Group of E-mail Servers
E-mail services are essential in the Internet. However, the current e-mail architecture presents problems that open it to several threats. Alternatives have been proposed to solve...
Leonardo de Oliveira, Carlos Maziero
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 10 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...