Sciweavers

1131 search results - page 105 / 227
» Making Sense of Twitter
Sort
View
DAC
2006
ACM
15 years 10 months ago
DFM: where's the proof of value?
How can design teams employ new tools and develop response methodologies yet still stay within design budgets? How much effort does it require to be an early adopter and what kind...
Shishpal Rawat, Raul Camposano, A. Kahng, Joseph S...
SOUPS
2006
ACM
15 years 10 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
DSN
2005
IEEE
15 years 10 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
ICADL
2005
Springer
102views Education» more  ICADL 2005»
15 years 10 months ago
Concept Expansion Using Semantic Fisheye Views
Exploratory search over a collection often requires users to iteratively apply a variety of strategies, such as searching for more general or more specific concepts in reaction to ...
Paul Janecek, Vincent Schickel, Pearl Pu
ICWE
2005
Springer
15 years 10 months ago
An Article Language Model for BBS Search
Bulletin Board Systems (BBS), similar to blogs, newsgroups, online forums, etc., are online broadcasting spaces where people can exchange ideas and make announcements. As BBS are b...
Jingfang Xu, Yangbo Zhu, Xing Li