Sciweavers

3686 search results - page 590 / 738
» Comprehensive comprehensions
Sort
View
CCS
2009
ACM
16 years 3 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
CHI
2009
ACM
16 years 3 months ago
Questions in, knowledge in?: a study of naver's question answering community
Large general-purposed community question-answering sites are becoming popular as a new venue for generating knowledge and helping users in their information needs. In this paper ...
Kevin Kyung Nam, Mark S. Ackerman, Lada A. Adamic
126
Voted
MOBISYS
2009
ACM
16 years 3 months ago
xShare: supporting impromptu sharing of mobile phones
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with other...
Yunxin Liu, Ahmad Rahmati, Yuanhe Huang, Hyukjae J...
140
Voted
KDD
2008
ACM
138views Data Mining» more  KDD 2008»
16 years 3 months ago
Quantitative evaluation of approximate frequent pattern mining algorithms
Traditional association mining algorithms use a strict definition of support that requires every item in a frequent itemset to occur in each supporting transaction. In real-life d...
Rohit Gupta, Gang Fang, Blayne Field, Michael Stei...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 3 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye