Sciweavers

578 search results - page 66 / 116
» Making PRIME usable
Sort
View
SIGSOFT
2008
ACM
16 years 17 days ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
WWW
2008
ACM
16 years 15 days ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
WWW
2008
ACM
16 years 15 days ago
Action science approach to nonprofit housing services using web 2.0 mapping tools
The study follows action science approach to the problem of nonprofit housing services. After 4 months of action sciencebased activities, such as organized participant observation...
Yao-Jen Chang, Hsin-Yu Hsu, Tsen-Yung Wang
WWW
2006
ACM
16 years 15 days ago
Template guided association rule mining from XML documents
Compared with traditional association rule mining in the structured world (e.g. Relational Databases), mining from XML data is confronted with more challenges due to the inherent ...
Rahman Ali Mohammadzadeh, Sadegh Soltan, Masoud Ra...
CHI
2009
ACM
16 years 12 days ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...