Sciweavers

3155 search results - page 518 / 631
» How Are You Doing
Sort
View
SOUPS
2010
ACM
15 years 9 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
CEAS
2008
Springer
15 years 7 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
CANDC
2005
ACM
15 years 7 months ago
Freedom and constraint in the creative process in digital fine art: an AHRB invited workshop
The workshop will explore in depth the nature of freedom and constraint in the creative process in digital fine art from the perspective of embodied mind. The problem is crucial t...
John Haworth, Sue Gollifer, James Faure Walker, Pa...
AAAI
2006
15 years 6 months ago
Overcoming the Brittleness Bottleneck using Wikipedia: Enhancing Text Categorization with Encyclopedic Knowledge
When humans approach the task of text categorization, they interpret the specific wording of the document in the much larger context of their background knowledge and experience. ...
Evgeniy Gabrilovich, Shaul Markovitch
AAAI
2006
15 years 6 months ago
A Bayesian Network for Outbreak Detection and Prediction
Health care officials are increasingly concerned with knowing early whether an outbreak of a particular disease is unfolding. We often have daily counts of some variable that are ...
Xia Jiang, Garrick L. Wallstrom