Sciweavers

889 search results - page 18 / 178
» An analysis of Internet chat systems
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 2 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
CSCW
2012
ACM
13 years 5 months ago
Come meet me at Ulduar: progression raiding in world of warcraft
In spite of decades of research on virtual worlds, our understanding of one popular form of virtual world behavior— raiding—remains limited. Raiding is important because it en...
Jeffrey Bardzell, Jeffrey Nichols, Tyler Pace, Sha...
WWW
2001
ACM
15 years 10 months ago
Improving mobile internet usability
Mobile internet technologies, such as WAP, are important for pervasive, anytime, anywhere computing. Although much progress has been made in terms of technological innovation, man...
George Buchanan, Sarah Farrant, Matt Jones, Harold...
HICSS
2006
IEEE
75views Biometrics» more  HICSS 2006»
15 years 3 months ago
Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive?
This article empirically examines the awareness, concern, and actions of home-based small business owners regarding Internet-based computer security risks. A scientific, Internet-...
David W. Johnson, Harold Koch
CCR
2004
102views more  CCR 2004»
14 years 9 months ago
Infrastructure for the quantum internet
A team of researchers from the Massachusetts Institute of Technology (MIT) and Northwestern University (NU) is developing a system for long-distance, high-fidelity qubit teleporta...
Seth Lloyd, Jeffrey H. Shapiro, Franco N. C. Wong,...