Sciweavers

1007 search results - page 149 / 202
» An Empirical Study of the Coolstreaming System
Sort
View
CHI
2006
ACM
16 years 1 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2005
ACM
16 years 1 months ago
An experiment in discovering personally meaningful places from location data
As mobile devices become location-aware, they offer the promise of powerful new applications. While computers work with physical locations like latitude and longitude, people thin...
Changqing Zhou, Pamela J. Ludford, Dan Frankowski,...
CHI
2002
ACM
16 years 1 months ago
"I'd be overwhelmed, but it's just one more thing to do": availability and interruption in research management
Many CSCW projects dealing with individual availability and interruption filtering achieve only limited success. Perhaps this is because designers of such systems have limited evi...
James M. Hudson, Jim Christensen, Wendy A. Kellogg...
CBMS
2009
IEEE
15 years 8 months ago
On the storage, management and analysis of (multi) similarity for large scale protein structure datasets in the grid
Assessment of the (Multi) Similarity among a set of protein structures is achieved through an ensemble of protein structure comparison methods/algorithms. This leads to the genera...
Gianluigi Folino, Azhar Ali Shah, Natalio Krasnogo...
RAID
2009
Springer
15 years 8 months ago
Automatically Adapting a Trained Anomaly Detector to Software Patches
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
Peng Li, Debin Gao, Michael K. Reiter