Norman Sadeh
Norman Sadeh
Professor of Computer Science, Carnegie Mellon University
Geverifieerd e-mailadres voor cs.cmu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Modeling supply chain dynamics: A multiagent approach
JM Swaminathan, SF Smith, NM Sadeh
Decision sciences 29 (3), 607-632, 1998
12541998
Learning to detect phishing emails
I Fette, N Sadeh, A Tomasic
Proceedings of the 16th international conference on World Wide Web, 649-656, 2007
6882007
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, J Hong, N Sadeh
6552012
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5692009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
5362010
M-commerce: technologies, services, and business models
N Sadeh
John Wiley & Sons, 2003
4912003
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4492012
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
4022009
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
International conference on financial cryptography and data security, 68-79, 2012
3682012
Look-ahead techniques for micro-opportunistic job shop scheduling
N Sadeh
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 1991
3411991
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
3392013
Distributed constrained heuristic search
K Sycara, SF Roth, N Sadeh, MS Fox
IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991
3011991
MASCOT: an agent-based architecture for dynamic supply chain creation and coordination in the internet economy
NM Sadeh, DW Hildum, D Kjenstad, A Tseng
Production Planning & Control 12 (3), 212-223, 2001
288*2001
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
2732015
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
2712013
Semantic web technologies to reconcile privacy and context awareness
FL Gandon, NM Sadeh
Journal of web semantics 1 (3), 241-260, 2004
2682004
Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem
N Sadeh, MS Fox
Artificial intelligence 86 (1), 1-41, 1996
2561996
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15 (7), 679-694, 2011
2202011
Constrained heuristic search
MS Fox, N Sadeh, C Baykan
Proceedings of the Eleventh International Joint Conference on Artificial …, 1989
2181989
Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings
J Lin, B Liu, N Sadeh, JI Hong
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 199-212, 2014
2172014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20