Sciweavers

239 search results - page 11 / 48
» How people recall search result lists
Sort
View
ICST
2010
IEEE
14 years 8 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
EWCBR
2008
Springer
14 years 11 months ago
Provenance, Trust, and Sharing in Peer-to-Peer Case-Based Web Search
Despite the success of modern Web search engines, challenges remain when it comes to providing people with access to the right information at the right time. In this paper, we desc...
Peter Briggs, Barry Smyth
WWW
2008
ACM
15 years 10 months ago
Keysurf: a character controlled browser for people with physical disabilities
For many users with a physical or motor disability, using a computer mouse or other pointing device to navigate the web is cumbersome or impossible due to problems with pointing a...
Leo Spalteholz, Kin Fun Li, Nigel Livingston, Foad...
66
Voted
CHI
2011
ACM
14 years 1 months ago
Computers can't give credit: how automatic attribution falls short in an online remixing community
In this paper, we explore the role that attribution plays in shaping user reactions to content reuse, or remixing, in a large user-generated content community. We present two stud...
Andrés Monroy-Hernández, Benjamin Ma...
JCIT
2008
93views more  JCIT 2008»
14 years 9 months ago
A search quality evaluation based on objective-subjective method
Commercial search engines, especially meta-search engines was designed to retrieve the information by submitting users' queries to multiple conventional search engines and in...
Fugui Wang, Yajun Du, Qinhua Dong