Norman Sadeh
Title
Cited by
Cited by
Year
Modeling supply chain dynamics: A multiagent approach
JM Swaminathan, SF Smith, NM Sadeh
Decision sciences 29 (3), 607-632, 1998
12521998
Learning to detect phishing emails
I Fette, N Sadeh, A Tomasic
Proceedings of the 16th international conference on World Wide Web, 649-656, 2007
6882007
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, J Hong, N Sadeh
6542012
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5682009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
5342010
M-commerce: technologies, services, and business models
N Sadeh
John Wiley & Sons, 2003
4912003
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4492012
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
4012009
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
International conference on financial cryptography and data security, 68-79, 2012
3682012
Look-ahead techniques for micro-opportunistic job shop scheduling
N Sadeh
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 1991
3411991
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
3382013
Distributed constrained heuristic search
K Sycara, SF Roth, N Sadeh, MS Fox
IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991
3011991
MASCOT: an agent-based architecture for dynamic supply chain creation and coordination in the internet economy
NM Sadeh, DW Hildum, D Kjenstad, A Tseng
Production Planning & Control 12 (3), 212-223, 2001
288*2001
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
2712015
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
2712013
Semantic web technologies to reconcile privacy and context awareness
FL Gandon, NM Sadeh
Journal of web semantics 1 (3), 241-260, 2004
2672004
Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem
N Sadeh, MS Fox
Artificial intelligence 86 (1), 1-41, 1996
2561996
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15 (7), 679-694, 2011
2202011
Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings
J Lin, B Liu, N Sadeh, JI Hong
10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 199-212, 2014
2172014
Constrained heuristic search
MS Fox, N Sadeh, C Baykan
Proceedings of the Eleventh International Joint Conference on Artificial …, 1989
2171989
The system can't perform the operation now. Try again later.
Articles 1–20