Sciweavers

187 search results - page 12 / 38
» Usability evaluation considered harmful (some of the time)
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
AGILEDC
2008
IEEE
15 years 4 months ago
Utilizing Digital Tabletops in Collocated Agile Planning Meetings
In agile software development, planning meetings play a pivotal role in establishing a concrete understanding of customers’ requirements. Using tools to enhance the effectivenes...
Yaser Ghanam, Xin Wang, Frank Maurer
86
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
79
Voted
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 3 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
82
Voted
SIGIR
2004
ACM
15 years 3 months ago
Display time as implicit feedback: understanding task effects
Recent research has had some success using the length of time a user displays a document in their web browser as implicit feedback for document preference. However, most studies h...
Diane Kelly, Nicholas J. Belkin