|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25 occurrences of 25 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Maria Francesca Costabile, Piero Mussio, Loredana Parasiliti Provenza, Antonio Piccinno |
Advanced visual systems supporting unwitting EUD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVI ![In: Proceedings of the working conference on Advanced Visual Interfaces, AVI 2008, Napoli, Italy, May 28-30, 2008, pp. 313-316, 2008, ACM Press, 978-1-60558-141-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
end-user development, end user, user classification |
56 | Marian Petre, Alan F. Blackwell |
Children as Unwitting End-User Programmers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VL/HCC ![In: 2007 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007), 23-27 September 2007, Coeur d'Alene, Idaho, USA, pp. 239-242, 2007, IEEE Computer Society, 978-0-7695-2987-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Jennifer G. Sheridan, Nick Bryan-Kinns, Alice Bayliss |
Encouraging witting participation and performance in digital live art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (1) ![In: Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it - Volume 1, BCS HCI 2007, University of Lancaster, United Kingdom, 3-7 September 2007, pp. 13-23, 2007, BCS, 978-1-902505-94-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Maori art, digital live art, iPoi, performance framing, poi, unwitting, wittingness, performer, participant, exertion interface, spectator |
32 | Shyam Rangarajan, Christian Eichhorn 0002, David A. Plecher, Gudrun Klinker |
Bonkers Borders - A Serious AR Game of Boundaries Unfitting and Consequences Unwitting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRW ![In: IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VR Workshops 2023, Shanghai, China, March 25-29, 2023, pp. 243-248, 2023, IEEE, 979-8-3503-4839-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Allison Perrone, Justin Edwards |
Chatbots as Unwitting Actors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.01921, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
32 | Allison Perrone, Justin Edwards |
Chatbots as unwitting actors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CUI ![In: Proceedings of the 1st International Conference on Conversational User Interfaces, CUI 2019, Dublin, Ireland, August 22-23, 2019., pp. 2:1-2:2, 2019, ACM, 978-1-4503-7187-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Matteo Peroni, Claudia Stefini, Daniela Fogli |
Smart Home Control through Unwitting Trigger-Action Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DMS ![In: The 22nd International Conference on Distributed Multimedia Systems, DMS 2016, Salerno, Italy, November 25-26, 2016., pp. 194-201, 2016, KSI Research Inc. / Knowledge Systems Institute Graduate School, 1-891706-40-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Jonida Milaj, Jeanne Pia Mifsud Bonnici |
Unwitting subjects of surveillance and the presumption of innocence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 30(4), pp. 419-428, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
32 | Barbara Rita Barricelli, Andrea Marcante, Piero Mussio, Loredana Parasiliti Provenza, Stefano Valtolina, Giuseppe Fresta |
BANCO: a Web Architecture Supporting Unwitting End-User Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IxD&A ![In: IxD&A 5-6, pp. 23-30, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
32 | Maria Francesca Costabile, Piero Mussio, Loredana Parasiliti Provenza, Antonio Piccinno |
End users as unwitting software developers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEUSE@ICSE ![In: Proceedings of the 4th international workshop on End-user software engineering, WEUSE '08, Leipzig, Germany, May 12, 2008, pp. 6-10, 2008, ACM, 978-1-60558-034-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Xavier Boyen |
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 94, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
32 | Jon Klein, Lee Spector |
Unwitting distributed genetic programming via asynchronous JavaScript and XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 1628-1635, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PushGP, stack-based genetic programming, XML, networking, JavaScript, AJAX, Push |
32 | Mona Gandhi, Markus Jakobsson, Jacob Ratkiewicz |
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensic Pract. ![In: J. Digit. Forensic Pract. 1(2), pp. 131-142, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Matthias Bauer |
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 72-78, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
anonymity, HTTP, covert channel, mix network |
23 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 875-882, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
23 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback |
RFID security and privacy: long-term research or short-term tinkering? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 160, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Saikat Guha 0002, Paul Francis |
Identity Trail: Covert Surveillance Using DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, pp. 153-166, 2007, Springer, 978-3-540-75550-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Janice C. Sipior, Burke T. Ward, Georgina R. Roselli |
A United States perspective on the ethical and legal issues of spyware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 738-743, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trespass, privacy, ethics, law, spyware |
23 | Mark F. Vilardo |
Online Impersonation in Securities Scams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(3), pp. 82-85, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SEC, Securities and Exchange Commission, digital identity, fraud, impersonation |
23 | Kahil Jallad, Jonathan Katz, Bruce Schneier |
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 90-101, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|