BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
interact (3)
lie (3)
detect (3)
model (3)
mediat (2)

Stem decept$ (all stems)

19 papers:

CHICHI-2015-AndersonGWF #interactive
Supporting Subtlety with Deceptive Devices and Illusory Interactions (FA, TG, DW, GWF), pp. 1489–1498.
CHICHI-2015-PandeyRSNB #analysis #empirical #how #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CSCWCSCW-2015-AzariaRK #detection
An Agent for Deception Detection in Discussion Based Environments (AA, AR, SK), pp. 218–227.
ICPRICPR-2014-SuL #detection
High-Stakes Deception Detection Based on Facial Expressions (LS, MDL), pp. 2519–2524.
CHICHI-2013-AdarTT #interactive
Benevolent deception in human computer interaction (EA, DST, JT), pp. 1863–1872.
SACSAC-2012-MengHO #algorithm #analysis #search-based
Analysis of a triploid genetic algorithm over deceptive landscapes (LM, SH, CO), pp. 244–249.
CSCWCSCW-2011-ReynoldsGMMVWBH #student
Contact stratification and deception: blackberry messenger versus SMS use among students (LR, SG, JM, ZM, PV, AW, JPB, JTH), pp. 221–224.
MLDMMLDM-2011-HaoCCCS #adaptation #detection #email #modelling
Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
CHICHI-2010-MarshallBP #collaboration #interactive
Deception and magic in collaborative interaction (JM, SB, TPP), pp. 567–576.
CHICHI-2010-SteptoeSRR #social
Lie tracking: social presence, truth and deception in avatar-mediated telecommunication (WS, AS, AR, JR), pp. 1039–1048.
CSCWCSCW-2010-BirnholtzGHB #quote
“On my way”: deceptive texting and interpersonal awareness narratives (JPB, JG, JTH, NNB), pp. 1–4.
CSCWCSCW-2010-TomaH #online
Reading between the lines: linguistic cues to deception in online dating profiles (CLT, JTH), pp. 5–8.
CSCWCSCW-2010-WarkentinWHC #communication
Warrants and deception in computer mediated communication (DW, MW, JTH, NC), pp. 9–12.
CHICHI-2009-HancockBBGPA #design
Butler lies: awareness, deception and design (JTH, JPB, NNB, JG, JP, BA), pp. 517–526.
SACSAC-2007-HuXP #approach #modelling #using
Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
CHICHI-2004-HancockTR #behaviour #communication #design
Deception and design: the impact of communication technology on lying behavior (JTH, JTS, TR), pp. 129–134.
SACSAC-2004-BelmonteCPR #robust
A robust deception-free coalition formation model (MVB, RC, JLPdlC, FTR), pp. 469–473.
CSCWCSCW-2002-BradnerM #distance #matter #persuasion #why
Why distance matters: effects on cooperation, persuasion and deception (EB, GM), pp. 226–235.
SOSPSOSP-2001-IyerD #framework #scheduling
Anticipatory scheduling: A disk scheduling framework to overcome deceptive idleness in synchronous I/O (SI, PD), pp. 117–130.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.