Sciweavers

274 search results - page 40 / 55
» Security user studies: methodologies and best practices
Sort
View
SIGIR
2005
ACM
15 years 3 months ago
Combining eye movements and collaborative filtering for proactive information retrieval
We study a new task, proactive information retrieval by combining implicit relevance feedback and collaborative filtering. We have constructed a controlled experimental setting, ...
Kai Puolamäki, Jarkko Salojärvi, Eerika ...
NSDI
2008
15 years 1 days ago
Centered Discretization with Application to Graphical Passwords
Discretization is used in click-based graphical passwords so that approximately correct entries can be accepted by the system. We show that the existing discretization scheme of B...
Sonia Chiasson, Jayakumar Srinivasan, Robert Biddl...
CHI
2010
ACM
15 years 2 months ago
MOSES: exploring new ground in media and post-conflict reconciliation
While the history of traditional media in post-conflict peace building efforts is rich and well studied, the potential for interactive new media technologies in this area has gone...
Thomas N. Smyth, John Etherton, Michael L. Best
SIGCOMM
2012
ACM
13 years 5 days ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
DIMVA
2011
14 years 1 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...