Modeling supply chain dynamics: A multiagent approach JM Swaminathan, SF Smith, NM Sadeh Decision sciences 29 (3), 607-632, 1998 | 1220 | 1998 |
Learning to detect phishing emails I Fette, N Sadeh, A Tomasic Proceedings of the 16th international conference on World Wide Web, 649-656, 2007 | 646 | 2007 |
The livehoods project: Utilizing social media to understand the dynamics of a city J Cranshaw, R Schwartz, J Hong, N Sadeh | 611 | 2012 |
A framework of energy efficient mobile sensing for automatic user state recognition Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 553 | 2009 |
Bridging the gap between physical location and online social networks J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 510 | 2010 |
M-commerce: technologies, services, and business models N Sadeh John Wiley & Sons, 2003 | 484 | 2003 |
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012 | 411 | 2012 |
Understanding and capturing people's privacy policies in a mobile social networking application N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao Personal and Ubiquitous Computing 13 (6), 401-412, 2009 | 391 | 2009 |
A conundrum of permissions: installing applications on an android smartphone PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall International conference on financial cryptography and data security, 68-79, 2012 | 342 | 2012 |
Look-ahead techniques for micro-opportunistic job shop scheduling N Sadeh CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 1991 | 332 | 1991 |
Why people hate your app: Making sense of user feedback in a mobile app store B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013 | 304 | 2013 |
Distributed constrained heuristic search K Sycara, SF Roth, N Sadeh, MS Fox IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991 | 288 | 1991 |
MASCOT: an agent-based architecture for dynamic supply chain creation and coordination in the internet economy NM Sadeh, DW Hildum, D Kjenstad, A Tseng Production Planning & Control 12 (3), 212-223, 2001 | 287* | 2001 |
Semantic web technologies to reconcile privacy and context awareness FL Gandon, NM Sadeh Web Semantics: Science, Services and Agents on the World Wide Web 1 (3), 241-260, 2004 | 259 | 2004 |
Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem N Sadeh, MS Fox Artificial intelligence 86 (1), 1-41, 1996 | 253 | 1996 |
Privacy as part of the app decision-making process PG Kelley, LF Cranor, N Sadeh Proceedings of the SIGCHI conference on human factors in computing systems …, 2013 | 244 | 2013 |
Your location has been shared 5,398 times!: A field study on mobile app privacy nudging H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ... Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 235 | 2015 |
Constrained heuristic search MS Fox, N Sadeh, C Baykan Proceedings of the Eleventh International Joint Conference on Artificial …, 1989 | 217 | 1989 |
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs M Benisch, PG Kelley, N Sadeh, LF Cranor Personal and Ubiquitous Computing 15 (7), 679-694, 2011 | 213 | 2011 |
Who's viewed you?: the impact of feedback in a mobile location-sharing application JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 208 | 2009 |