Sciweavers

1156 search results - page 216 / 232
» Implications for design
Sort
View
ACSAC
2009
IEEE
15 years 4 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
85
Voted
CHI
2011
ACM
14 years 1 months ago
Knowing funny: genre perception and categorization in social video sharing
Categorization of online videos is often treated as a tag suggestion task; tags can be generated by individuals or by machine classification. In this paper, we suggest categoriza...
Jude Yew, David A. Shamma, Elizabeth F. Churchill
WWW
2009
ACM
15 years 10 months ago
Computers and iphones and mobile phones, oh my!: a logs-based comparison of search users on different devices
We present a logs-based comparison of search patterns across three platforms: computers, iPhones and conventional mobile phones. Our goal is to understand how mobile search users ...
Maryam Kamvar, Melanie Kellar, Rajan Patel, Ya Xu
WWW
2004
ACM
15 years 10 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
WWW
2001
ACM
15 years 10 months ago
Enabling full service surrogates using the portable channel representation
The simplicity of the basic client/server model of Web services led quickly to its widespread adoption, but also to scalability and performance problems. The technological respons...
Micah Beck, Terry Moore, Leif Abrahamsson, Christo...