Sciweavers

2564 search results - page 234 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
142
Voted
ASC
2008
15 years 3 months ago
Info-fuzzy algorithms for mining dynamic data streams
Most data mining algorithms assume static behavior of the incoming data. In the real world, the situation is different and most continuously collected data streams are generated by...
Lior Cohen, Gil Avrahami, Mark Last, Abraham Kande...
128
Voted
CHI
2008
ACM
16 years 3 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
156
Voted
ACMDIS
2006
ACM
15 years 9 months ago
Popcorn: the personal knowledge base
People often use powerful tools to manage the documents they encounter, but very rarely to store the mental knowledge they glean from those documents. Popcorn is a personal knowle...
Stephen Davies, Scotty Allen, Jon Raphaelson, Emil...
131
Voted
PERCOM
2004
ACM
16 years 3 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
CHI
2009
ACM
15 years 6 months ago
Connecting the dots with related notes
During visual analysis, users must often connect insights discovered at various points of time to understand implicit relations within their analysis. This process is often called...
Yedendra Babu Shrinivasan, David Gotz