Sciweavers

559 search results - page 105 / 112
» Sketching Information Divergences
Sort
View
ECRIME
2007
15 years 1 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
CIKM
2008
Springer
14 years 11 months ago
Topic models and a revisit of text-related applications
Topic models such as aspect model or LDA have been shown as a promising approach for text modeling. Unlike many previous models that restrict each document to a single topic, topi...
Viet Ha-Thuc, Padmini Srinivasan
DSVIS
2008
Springer
14 years 11 months ago
Multi-fidelity User Interface Specifications
Specifying user interfaces consists in a fundamental activity in the user interface development life cycle as it informs the subsequent steps. Good quality specifications could lea...
Thomas Memmel, Jean Vanderdonckt, Harald Reiterer
CIDR
2003
125views Algorithms» more  CIDR 2003»
14 years 11 months ago
Crossing the Structure Chasm
It has frequently been observed that most of the world’s data lies outside database systems. The reason is that database systems focus on structured data, leaving the unstructur...
Alon Y. Halevy, Oren Etzioni, AnHai Doan, Zachary ...
MDBIS
2004
149views Database» more  MDBIS 2004»
14 years 11 months ago
Enhanced User Support for Mobile Ad-hoc-Processes
: In ubiquitous application scenarios, the information (processing) needs of nomadic users often cannot be satisfied by a set of pre-installed processes like in common workflow sys...
Klaus Haller, Michelle Ackermann, Claudio Munari, ...