Follow
Bryan A. Pendleton
Bryan A. Pendleton
Google
Verified email at geekdom.net
Title
Cited by
Cited by
Year
He says, she says: conflict and coordination in Wikipedia
A Kittur, B Suh, BA Pendleton, EH Chi
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
8592007
Power of the few vs. wisdom of the crowd: Wikipedia and the rise of the bourgeoisie
A Kittur, E Chi, BA Pendleton, B Suh, T Mytkowicz
World wide web 1 (2), 19, 2007
6572007
Lifting the veil: improving accountability and social transparency in Wikipedia with wikidashboard
B Suh, EH Chi, A Kittur, BA Pendleton
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
1892008
Method and system for securely sharing files
D Balfanz, T Lunt, D Smetters, K Conley, P Stewart, S Cousins, ...
US Patent 7,549,047, 2009
1692009
Systems and methods for authenticating communications in a network medium
D Smetters, K Conley, B Pendleton, G Durfee, S Cousins, D Balfanz, ...
US Patent App. 10/703,437, 2005
1172005
Us vs. them: Understanding social dynamics in Wikipedia with revert graph visualizations
B Suh, EH Chi, BA Pendleton, A Kittur
2007 IEEE symposium on visual analytics science and technology, 163-170, 2007
1062007
Herding the cats: the influence of groups in coordinating peer production
A Kittur, B Pendleton, RE Kraut
Proceedings of the 5th international Symposium on Wikis and Open …, 2009
972009
Time tree: Exploring time changing hierarchies
SK Card, B Suh, BA Pendleton, J Heer, JW Bodnar
2006 IEEE Symposium On Visual Analytics Science And Technology, 3-10, 2006
942006
System and method for establishing secondary channels
KW Conley, D Balfanz, BA Pendleton, DK Smetters, GE Durfee
US Patent 7,916,861, 2011
812011
Systems and methods for authenticating communications in a network medium
D Balfanz, D Smetters, K Conley, B Pendleton, S Cousins
US Patent 7,937,752, 2011
472011
Smartening the crowds: computational techniques for improving human verification to fight phishing scams
G Liu, G Xiang, BA Pendleton, JI Hong, W Liu
Proceedings of the seventh symposium on usable privacy and security, 1-13, 2011
422011
A hierarchical adaptive probabilistic approach for zero hour phish detection
G Xiang, BA Pendleton, J Hong, CP Rose
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
342010
WebTicket: Account management using printable tokens
E Hayashi, B Pendleton, F Ozenc, J Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2012
272012
Augmented Social Cognition.
EH Chi, P Pirolli, B Suh, A Kittur, BA Pendleton, T Mytkowicz
AAAI Spring Symposium: Social information processing, 11-17, 2008
242008
Modeling content from human-verified blacklists for accurate zero-hour phish detection
G Xiang, BA Pendleton, J Hong
probabilistic approach for zero hour phish detection, In Proceedings of the …, 2009
82009
Method and apparatus for calibrating a camera-based whiteboard scanner
E Saund, B Pendleton, K Roufas, H Shemtov
US Patent 7,657,117, 2010
72010
Augmented social cognition: Understanding social foraging and social sensemaking
EH Chi, A Kittur, T Mytkowicz, B Pendleton, B Suh
Plenary paper at HCIC, 2007
72007
Tailoring websites to increase contributions to online communities
MK Lee, T Dillahunt, B Pendleton, R Kraut, S Kiesler
CHI'09 Extended Abstracts on Human Factors in Computing Systems, 4003-4008, 2009
32009
Lifting the veil
B Suh, H Chi, A Kittur, BA Pendleton
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2008
12008
Investigation of Content-based Methods for Phish Detection
G Xiang, BA Pendleton, J Hong
The system can't perform the operation now. Try again later.
Articles 1–20