Sciweavers

7383 search results - page 1433 / 1477
» Theories of information behavior
Sort
View
WWW
2010
ACM
15 years 4 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
WWW
2010
ACM
15 years 4 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
WWW
2010
ACM
15 years 4 months ago
Empirical comparison of algorithms for network community detection
Detecting clusters or communities in large real-world graphs such as large social or information networks is a problem of considerable interest. In practice, one typically chooses...
Jure Leskovec, Kevin J. Lang, Michael W. Mahoney
WWW
2010
ACM
15 years 4 months ago
Measurement and analysis of an online content voting network: a case study of Digg
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
Yingwu Zhu
CHI
2010
ACM
15 years 4 months ago
d.note: revising user interfaces through change tracking, annotations, and alternatives
Interaction designers typically revise user interface prototypes by adding unstructured notes to storyboards and screen printouts. How might computational tools increase the effic...
Björn Hartmann, Sean Follmer, Antonio Ricciar...
« Prev « First page 1433 / 1477 Last » Next »