Sciweavers

2623 search results - page 476 / 525
» Universal Learning Theory
Sort
View
86
Voted
CHI
2010
ACM
15 years 7 months ago
Using reinforcement to strengthen users' secure behaviors
Users have a strong tendency toward dismissing security dialogs unthinkingly. Prior research has shown that users' responses to security dialogs become significantly more tho...
Ricardo Villamarín-Salomón, Jos&eacu...
CHI
2010
ACM
15 years 7 months ago
Experience in social affective applications: methodologies and case study
New forms of social affective applications are emerging, bringing with them challenges in design and evaluation. We report on one such application, conveying wellbeing for both pe...
Paul André, m. c. schraefel, Alan J. Dix, R...
91
Voted
EUROSEC
2010
ACM
15 years 7 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
MUE
2009
IEEE
144views Multimedia» more  MUE 2009»
15 years 7 months ago
Maxtream: Stabilizing P2P Streaming by Active Prediction of Behavior Patterns
In theory, peer-to-peer (P2P) based streaming designs and simulations provide a promising alternative to serverbased streaming systems both in cost and scalability. In practice ho...
Shay Horovitz, Danny Dolev
91
Voted
IEEEIAS
2009
IEEE
15 years 7 months ago
Organizational Barriers to the Implementation of Security Engineering
: The link between security engineering and systems engineering exists at the earliest stage of systems development, and, as a whole, there is sufficient evidence to suggest the di...
Bryan Stewart Cline