In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Many users are familiar with the interesting but limited functionality of Data Detector interfaces like Microsoft's Smart Tags and Google's AutoLink. In this paper we si...
The development of intelligent assistants has largely benefited from the adoption of decision-theoretic (DT) approaches that enable an agent to reason and account for the uncertai...
Bowen Hui, Sean Gustafson, Pourang Irani, Craig Bo...
As demand for grid and cloud computing solutions increases, the need for user oriented software to provide access to theses resources also increases. Until recently the use of com...
Casey Rathbone, Lizhe Wang, Gregor von Laszewski, ...
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...