Sciweavers

1949 search results - page 163 / 390
» Protective Interface Specifications
Sort
View
DEBU
2000
108views more  DEBU 2000»
15 years 1 months ago
Next Generation Web Search: Setting Our Sites
The current state of web search is most successful at directing users to appropriate web sites. Once at the site, the user has a choice of following hyperlinks or using site searc...
Marti A. Hearst
106
Voted
SIGMETRICS
2000
ACM
117views Hardware» more  SIGMETRICS 2000»
15 years 1 months ago
Crawler-Friendly Web Servers
In this paper we study how to make web servers (e.g., Apache) more crawler friendly. Current web servers offer the same interface to crawlers and regular web surfers, even though ...
Onn Brandman, Junghoo Cho, Hector Garcia-Molina, N...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
16 years 3 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...
163
Voted
CHIMIT
2009
ACM
15 years 8 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
134
Voted
SOUPS
2005
ACM
15 years 7 months ago
Authentication using graphical passwords: effects of tolerance and image choice
Graphical passwords are an alternative to alphanumeric passwords in which users click on images to authenticate themselves rather than type alphanumeric strings. We have developed...
Susan Wiedenbeck, Jim Waters, Jean-Camille Birget,...