Norman Sadeh
Título
Citado por
Citado por
Año
Modeling supply chain dynamics: A multiagent approach
JM Swaminathan, SF Smith, NM Sadeh
Decision sciences 29 (3), 607-632, 1998
12421998
Learning to detect phishing emails
I Fette, N Sadeh, A Tomasic
Proceedings of the 16th international conference on World Wide Web, 649-656, 2007
6802007
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, J Hong, N Sadeh
6482012
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5612009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
5262010
M-commerce: technologies, services, and business models
N Sadeh
John Wiley & Sons, 2003
4902003
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4422012
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
3962009
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
International conference on financial cryptography and data security, 68-79, 2012
3652012
Look-ahead techniques for micro-opportunistic job shop scheduling
N Sadeh
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 1991
3381991
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
3282013
Distributed constrained heuristic search
K Sycara, SF Roth, N Sadeh, MS Fox
IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991
2991991
MASCOT: an agent-based architecture for dynamic supply chain creation and coordination in the internet economy
NM Sadeh, DW Hildum, D Kjenstad, A Tseng
Production Planning & Control 12 (3), 212-223, 2001
288*2001
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
2662015
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
2662013
Semantic web technologies to reconcile privacy and context awareness
FL Gandon, NM Sadeh
Journal of web semantics 1 (3), 241-260, 2004
2602004
Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem
N Sadeh, MS Fox
Artificial intelligence 86 (1), 1-41, 1996
2551996
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15 (7), 679-694, 2011
2182011
Constrained heuristic search
MS Fox, N Sadeh, C Baykan
Proceedings of the Eleventh International Joint Conference on Artificial …, 1989
2181989
Who's viewed you? The impact of feedback in a mobile location-sharing application
JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
2122009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20