He says, she says: conflict and coordination in Wikipedia A Kittur, B Suh, BA Pendleton, EH Chi Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007 | 878 | 2007 |
Power of the few vs. wisdom of the crowd: Wikipedia and the rise of the bourgeoisie A Kittur, E Chi, BA Pendleton, B Suh, T Mytkowicz World wide web 1 (2), 19, 2007 | 663 | 2007 |
Lifting the veil: improving accountability and social transparency in Wikipedia with wikidashboard B Suh, EH Chi, A Kittur, BA Pendleton Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008 | 193 | 2008 |
Method and system for securely sharing files D Balfanz, T Lunt, D Smetters, K Conley, P Stewart, S Cousins, ... US Patent 7,549,047, 2009 | 169 | 2009 |
Systems and methods for authenticating communications in a network medium D Smetters, K Conley, B Pendleton, G Durfee, S Cousins, D Balfanz, ... US Patent App. 10/703,437, 2005 | 119 | 2005 |
Us vs. them: Understanding social dynamics in Wikipedia with revert graph visualizations B Suh, EH Chi, BA Pendleton, A Kittur 2007 IEEE symposium on visual analytics science and technology, 163-170, 2007 | 108 | 2007 |
Herding the cats: the influence of groups in coordinating peer production A Kittur, B Pendleton, RE Kraut Proceedings of the 5th international Symposium on Wikis and Open …, 2009 | 102 | 2009 |
Time tree: Exploring time changing hierarchies SK Card, B Suh, BA Pendleton, J Heer, JW Bodnar 2006 IEEE Symposium On Visual Analytics Science And Technology, 3-10, 2006 | 96 | 2006 |
System and method for establishing secondary channels KW Conley, D Balfanz, BA Pendleton, DK Smetters, GE Durfee US Patent 7,916,861, 2011 | 82 | 2011 |
Systems and methods for authenticating communications in a network medium D Balfanz, D Smetters, K Conley, B Pendleton, S Cousins US Patent 7,937,752, 2011 | 48 | 2011 |
Smartening the crowds: computational techniques for improving human verification to fight phishing scams G Liu, G Xiang, BA Pendleton, JI Hong, W Liu Proceedings of the seventh symposium on usable privacy and security, 1-13, 2011 | 42 | 2011 |
A hierarchical adaptive probabilistic approach for zero hour phish detection G Xiang, BA Pendleton, J Hong, CP Rose Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 37 | 2010 |
WebTicket: Account management using printable tokens E Hayashi, B Pendleton, F Ozenc, J Hong Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012 | 27 | 2012 |
Augmented Social Cognition. EH Chi, P Pirolli, B Suh, A Kittur, BA Pendleton, T Mytkowicz AAAI Spring Symposium: Social information processing, 11-17, 2008 | 24 | 2008 |
Modeling content from human-verified blacklists for accurate zero-hour phish detection G Xiang, BA Pendleton, J Hong probabilistic approach for zero hour phish detection, In Proceedings of the …, 2009 | 9 | 2009 |
Method and apparatus for calibrating a camera-based whiteboard scanner E Saund, B Pendleton, K Roufas, H Shemtov US Patent 7,657,117, 2010 | 7 | 2010 |
Augmented social cognition: Understanding social foraging and social sensemaking EH Chi, A Kittur, T Mytkowicz, B Pendleton, B Suh Plenary paper at HCIC, 2007 | 7 | 2007 |
Tailoring websites to increase contributions to online communities MK Lee, T Dillahunt, B Pendleton, R Kraut, S Kiesler CHI'09 Extended Abstracts on Human Factors in Computing Systems, 4003-4008, 2009 | 3 | 2009 |
Lifting the veil B Suh, H Chi, A Kittur, BA Pendleton Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2008 | | 2008 |
Investigation of Content-based Methods for Phish Detection G Xiang, BA Pendleton, J Hong | | |