Sciweavers

1925 search results - page 370 / 385
» Documenting software systems with views
Sort
View
ACL
2010
14 years 7 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
76
Voted
WWW
2009
ACM
15 years 10 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
EUROSYS
2008
ACM
15 years 6 months ago
Flicker: an execution infrastructure for tcb minimization
We present Flicker, an infrastructure for executing securitysensitive code in complete isolation while trusting as few as 250 lines of additional code. Flicker can also provide me...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
IUI
2010
ACM
15 years 6 months ago
An adaptive calendar assistant using pattern mining for user preference modelling
In this paper, we present SmartCal, a calendar assistant that suggests appointment attributes, such as time, day, duration, etc., given any combination of initial user input attri...
Alfred Krzywicki, Wayne Wobcke, Anna Wong
CHI
2010
ACM
15 years 4 months ago
End-user mashup programming: through the design lens
Programming has recently become more common among ordinary end users of computer systems. We believe that these end-user programmers are not just coders but also designers, in tha...
Jill Cao, Yann Riche, Susan Wiedenbeck, Margaret M...