Sciweavers

119 search results - page 20 / 24
» Factor Refinement
Sort
View
WWW
2006
ACM
16 years 10 days ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
SIGCSE
2009
ACM
194views Education» more  SIGCSE 2009»
16 years 7 days ago
Integrating pedagogical code reviews into a CS 1 course: an empirical study
Formal code inspections are employed by teams of professional software engineers to identify software defects and improve the quality of software. After reviewing a piece of code ...
Christopher D. Hundhausen, Anukrati Agrawal, Dana ...
RECOMB
2005
Springer
15 years 12 months ago
Improved Pattern-Driven Algorithms for Motif Finding in DNA Sequences
Abstract. In order to guarantee that the optimal motif is found, traditional pattern-driven approaches perform an exhaustive search over all candidate motifs of length l. We develo...
Sing-Hoi Sze, Xiaoyan Zhao
IUI
2010
ACM
15 years 8 months ago
Towards maximizing the accuracy of human-labeled sensor data
We present two studies that evaluate the accuracy of human responses to an intelligent agent’s data classification questions. Prior work has shown that agents can elicit accurat...
Stephanie Rosenthal, Anind K. Dey
87
Voted
SOUPS
2009
ACM
15 years 6 months ago
A "nutrition label" for privacy
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have sh...
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith C...