Sciweavers

1606 search results - page 192 / 322
» Using task analysis in documentation field research
Sort
View
124
Voted
WWW
2010
ACM
15 years 10 months ago
Exploring web scale language models for search query processing
It has been widely observed that search queries are composed in a very different style from that of the body or the title of a document. Many techniques explicitly accounting for...
Jian Huang 0002, Jianfeng Gao, Jiangbo Miao, Xiaol...
107
Voted
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 10 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
129
Voted
DIMVA
2010
15 years 5 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
133
Voted
CAS
2004
111views more  CAS 2004»
15 years 3 months ago
Network Analysis and Social Dynamics
? Network analysis, an area of mathematical sociology and anthropology crucial to the linking of theory and observation, developed dramatically in recent decades. These development...
Douglas White
160
Voted
JMLR
2010
162views more  JMLR 2010»
14 years 10 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...