Sciweavers

274 search results - page 35 / 55
» Security user studies: methodologies and best practices
Sort
View
IUI
2004
ACM
15 years 3 months ago
Designing example-critiquing interaction
In many practical scenarios, users are faced with the problem of choosing the most preferred outcome from a large set of possibilities. As people are unable to sift through them m...
Boi Faltings, Pearl Pu, Marc Torrens, Paolo Viappi...
WWW
2007
ACM
15 years 10 months ago
Review spam detection
It is now a common practice for e-commerce Web sites to enable their customers to write reviews of products that they have purchased. Such reviews provide valuable sources of info...
Nitin Jindal, Bing Liu
CCS
2008
ACM
14 years 11 months ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...
BIOSURVEILLANCE
2007
Springer
15 years 3 months ago
Assessing Seasonal Variation in Multisource Surveillance Data: Annual Harmonic Regression
A significant proportion of human diseases, spanning the gamut from viral respiratory disease to arthropod-borne macroparasitic infections of the blood, exhibit distinct and stable...
Eric Lofgren, Nina Fefferman, Meena Doshi, Elena N...
CHI
2001
ACM
15 years 10 months ago
Optimizing search by showing results in context
We developed and evaluated seven interfaces for integrating semantic category information with Web search results. List interfaces were based on the familiar ranked-listing of sea...
Susan T. Dumais, Edward Cutrell, Hao Chen