Sciweavers

4172 search results - page 209 / 835
» Computing Machinery and Understanding
Sort
View
152
Voted
ECRIME
2007
15 years 7 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
120
Voted
SDM
2007
SIAM
73views Data Mining» more  SDM 2007»
15 years 5 months ago
Sketching Landscapes of Page Farms
The Web is a very large social network. It is important and interesting to understand the “ecology” of the Web: the general relations of Web pages to their environment. The un...
Bin Zhou 0002, Jian Pei
128
Voted
ACL
1998
15 years 5 months ago
Growing Semantic Grammars
A critical path in the development of natural language understanding NLU modules lies in the di culty of de ning a mapping from words to semantics: Usually it takes in the order o...
Marsal Gavaldà, Alex Waibel
118
Voted
CHI
2002
ACM
16 years 4 months ago
A different kind of information appliance: fridge companion
A prototype device is described that allows a user to understand and contemplate the inner workings of a common home appliance, the refrigerator. The device monitors select physic...
Marc Böhler
134
Voted
UDM
2005
IEEE
15 years 9 months ago
Context for Ubiquitous Data Management
In response to the advance of ubiquitous computing technologies, we believe that for computer systems to be ubiquitous, they must be context-aware. In this paper, we address the i...
Arthur H. van Bunningen, Ling Feng, Peter M. G. Ap...