Sciweavers

106 search results - page 8 / 22
» Human, organizational, and technological factors of IT secur...
Sort
View
WWW
2008
ACM
15 years 10 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth
WWW
2006
ACM
15 years 10 months ago
Capturing the essentials of federated systems
Today, the Web is increasingly used as a platform for distributed services, which transcend organizational boundaries to form federated applications. Consequently, there is a grow...
Alexander Brändle, Frederic Majer, Johannes M...
WWW
2010
ACM
15 years 1 months ago
Diversifying landmark image search results by learning interested views from community photos
In this paper, we demonstrate a novel landmark photo search and browsing system, Agate, which ranks landmark image search results considering their relevance, diversity and qualit...
Yuheng Ren, Mo Yu, Xin-Jing Wang, Lei Zhang, Wei-Y...
OOPSLA
2010
Springer
14 years 8 months ago
The Tower of Babel did not fail
Fred Brooks’ retelling of the biblical story of the Tower of Babel offers many insights into what makes building software difficult. The difficulty, according to common interp...
Paul Adamczyk, Munawar Hafiz
NSPW
2006
ACM
15 years 3 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti