Sciweavers

2648 search results - page 78 / 530
» Human Factors In Computer Security
Sort
View
CSCW
2011
ACM
14 years 4 months ago
Designing incentives for inexpert human raters
The emergence of online labor markets makes it far easier to use individual human raters to evaluate materials for data collection and analysis in the social sciences. In this pap...
Aaron D. Shaw, John J. Horton, Daniel L. Chen
JIB
2006
78views more  JIB 2006»
14 years 9 months ago
Identification of embryo specific human isoforms using a database of predicted alternative splice forms
Alternative splicing is one of the most important mechanisms to generate a large number of mRNA and protein isoforms from a small number of genes. Its study became one of the hot ...
Heike Pospisil
MOBISYS
2010
ACM
15 years 6 days ago
Ensemble: cooperative proximity-based authentication
Ensemble is a system that uses a collection of trusted personal devices to provide proximity-based authentication in pervasive environments. Users are able to securely pair their ...
Andre Kalamandeen, Adin Scannell, Eyal de Lara, An...
CCS
2010
ACM
14 years 10 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
TPDS
2008
106views more  TPDS 2008»
14 years 9 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin