Norman Sadeh
Title
Cited by
Cited by
Year
Modeling supply chain dynamics: A multiagent approach
JM Swaminathan, SF Smith, NM Sadeh
Decision sciences 29 (3), 607-632, 1998
12661998
Learning to detect phishing emails
I Fette, N Sadeh, A Tomasic
Proceedings of the 16th international conference on World Wide Web, 649-656, 2007
7692007
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, J Hong, N Sadeh
6922012
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5902009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
5682010
M-commerce: technologies, services, and business models
N Sadeh
John Wiley & Sons, 2003
4952003
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4872012
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
4292009
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
3902013
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
International conference on financial cryptography and data security, 68-79, 2012
3902012
Look-ahead techniques for micro-opportunistic job shop scheduling
N Sadeh
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 1991
3311991
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
3142015
Distributed constrained heuristic search
K Sycara, SF Roth, N Sadeh, MS Fox
IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991
3001991
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
2992013
Semantic web technologies to reconcile privacy and context awareness
FL Gandon, NM Sadeh
Journal of Web Semantics 1 (3), 241-260, 2004
2782004
Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem
N Sadeh, MS Fox
Artificial intelligence 86 (1), 1-41, 1996
2601996
Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings
J Lin, B Liu, N Sadeh, JI Hong
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 199-212, 2014
2452014
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15 (7), 679-694, 2011
2312011
Location-sharing technologies: Privacy risks and controls
JY Tsai, PG Kelley, LF Cranor, N Sadeh
Isjlp 6, 119, 2010
2252010
Constrained heuristic search
MS Fox, N Sadeh, C Baykan
Proceedings of the Eleventh International Joint Conference on Artificial …, 1989
2211989
The system can't perform the operation now. Try again later.
Articles 1–20