Sciweavers

448 search results - page 73 / 90
» Who is in Control
Sort
View
108
Voted
ISSA
2008
15 years 5 months ago
Social Aspects of Information Security
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...
145
Voted
CONSTRAINTS
2008
117views more  CONSTRAINTS 2008»
15 years 3 months ago
Domain Specific High-Level Constraints for User Interface Layout
We present the Auckland Layout Model (ALM), a constraint-based technique for specifying 2D layout as it is used for arranging the controls in a GUI. Most GUI frameworks offer layo...
Christof Lutteroth, Robert Strandh, Gerald Weber
147
Voted
SOFTWARE
2008
15 years 3 months ago
What Do We Know about Developer Motivation?
s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
WWW
2011
ACM
14 years 10 months ago
Here, there, and everywhere: correlated online behaviors can lead to overestimates of the effects of advertising
Measuring the causal effects of online advertising (adfx) on user behavior is important to the health of the WWW publishing industry. In this paper, using three controlled experi...
Randall A. Lewis, Justin M. Rao, David H. Reiley
107
Voted
JOCN
2010
136views more  JOCN 2010»
14 years 10 months ago
Music and Speech Listening Enhance the Recovery of Early Sensory Processing after Stroke
Our surrounding auditory environment has a dramatic influence on the development of basic auditory and cognitive skills, but little is known about how it influences the recovery o...
Teppo Särkämö, Elina Pihko, Sari La...