Sciweavers

7742 search results - page 1449 / 1549
» The Robustness of Level Sets
Sort
View
95
Voted
WWW
2008
ACM
16 years 1 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
110
Voted
WWW
2008
ACM
16 years 1 months ago
User oriented link function classification
Currently most link-related applications treat all links in the same web page to be identical. One link-related application usually requires one certain property of hyperlinks but...
Mingliang Zhu, Weiming Hu, Ou Wu, Xi Li, Xiaoqin Z...
87
Voted
WWW
2008
ACM
16 years 1 months ago
Flickr tag recommendation based on collective knowledge
Online photo services such as Flickr and Zooomr allow users to share their photos with family, friends, and the online community at large. An important facet of these services is ...
Börkur Sigurbjörnsson, Roelof van Zwol
102
Voted
WWW
2004
ACM
16 years 1 months ago
Fine-grained, structured configuration management for web projects
Researchers in Web engineering have regularly noted that existing Web application development environments provide little support for managing the evolution of Web applications. K...
Tien Nhut Nguyen, Ethan V. Munson, Cheng Thao
101
Voted
CHI
2009
ACM
16 years 1 months ago
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware
Indirect input techniques allow users to quickly access all parts of tabletop workspaces without the need for physical access; however, indirect techniques restrict the available ...
David Pinelle, Mutasem Barjawi, Miguel A. Nacenta,...
« Prev « First page 1449 / 1549 Last » Next »