Sciweavers

2450 search results - page 415 / 490
» Exploring Unknown Environments
Sort
View
151
Voted
ECRIME
2007
15 years 7 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
123
Voted
DEBS
2010
ACM
15 years 7 months ago
Quilt: a patchwork of multicast regions
Network bottlenecks, firewalls, restrictions on IP Multicast availability and administrative policies have long prevented the use of multicast even where the fit seems obvious. ...
Qi Huang, Ymir Vigfusson, Ken Birman, Haoyuan Li
114
Voted
CANDT
2009
15 years 7 months ago
And the ringleaders were banned: an examination of protest in virtual worlds
Protest has made the jump between the offline and the online spaces and is frequently used in most virtual worlds available today. Despite the frequency of these protest actions i...
Bridget Marie Blodgett
117
Voted
FASE
2009
Springer
15 years 7 months ago
Interface Generation and Compositional Verification in JavaPathfinder
Abstract. We present a novel algorithm for interface generation of software components. Given a component, our algorithm uses learning techniques to compute a permissive interface ...
Dimitra Giannakopoulou, Corina S. Pasareanu
112
Voted
HT
2007
ACM
15 years 7 months ago
The evolution of authorship in a remix society
Authorship entails the constrained selection or generation of media and the organization and layout of that media in a larger structure. But authorship is more than just selection...
Nicholas Diakopoulos, Kurt Luther, Yevgeniy Eugene...