Sciweavers

348 search results - page 22 / 70
» Secure Computation on the Web: Computing without Simultaneou...
Sort
View
118
Voted
COMPGEOM
2008
ACM
15 years 3 months ago
Visualizing and exploring planar algebraic arrangements: a web application
A web application is presented to compute, plot, and interactively explore planar arrangements induced by algebraic plane curves of arbitrary degree. It produces accurate curve pl...
Pavel Emeliyanenko, Michael Kerber
WWW
2009
ACM
16 years 2 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
CHI
2008
ACM
16 years 2 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
86
Voted
CHI
1999
ACM
15 years 6 months ago
Visualizing Implicit Queries for Information Management and Retrieval
In this paper, we describe the use of similarity metrics in a novel visual environment for storing and retrieving favorite web pages. The similarity metrics, called Implicit Queri...
Mary Czerwinski, Susan T. Dumais, George G. Robert...
HICSS
2009
IEEE
138views Biometrics» more  HICSS 2009»
15 years 8 months ago
Designing an Intelligent Agent that Negotiates Tactfully with Human Counterparts: A Conceptual Analysis and Modeling Framework
Automated negotiation has attracted growing interest within fields such as e-business, multi-agent systems, and web services. Nevertheless, a majority of automated negotiation res...
Yinping Yang, Sharad Singhal