Sciweavers

119 search results - page 6 / 24
» What do we know about the h index
Sort
View
AINA
2007
IEEE
14 years 1 months ago
Towards Quantifying the (In)Security of Networked Systems
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
Xiaohu Li, T. Paul Parker, Shouhuai Xu
CHI
2011
ACM
12 years 11 months ago
Post-deployment usability: a survey of current practices
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
SIGUCCS
2003
ACM
14 years 20 days ago
Escaping the quicksand and getting back on the trail of team projects
Working in a team environment can be either an efficient and productive means of completing projects or a nightmare where the project never seems to end. Most of us have been a pa...
Steven K. Brawn, Kelly Caye, R. Mark Koan
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
12 years 3 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
HRI
2010
ACM
14 years 1 months ago
Judging a bot by its cover: an experiment on expectation setting for personal robots
—Managing user expectations of personal robots becomes particularly challenging when the end-user just wants to know what the robot can do, and neither understands nor cares abou...
Steffi Paepcke, Leila Takayama