Sciweavers

6300 search results - page 45 / 1260
» We have it easy, but do we have it right
Sort
View
95
Voted
SOUPS
2010
ACM
15 years 4 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
105
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
100
Voted
SIGUCCS
2000
ACM
15 years 5 months ago
Manage All the Computer Labs on Campus? What Did I Do to Deserve This?
This paper will discuss how the Information Services Client Services group facilitates the support of campus computer labs. It will discuss how one group consisting of three full-...
Kathy DuBose
100
Voted
UAI
2001
15 years 2 months ago
When do Numbers Really Matter?
Common wisdom has it that small distinctions in the probabilities quantifying a belief network do not matter much for the results of probabilistic queries. Yet, one can develop re...
Hei Chan, Adnan Darwiche
97
Voted
MM
1993
ACM
107views Multimedia» more  MM 1993»
15 years 4 months ago
What Video Can and Can't Do for Collaboration: A Case Study
As multimedia becomes an integral part of collaborative systems, we must understand how to design such systems to support users’ rich set of existing interaction skills, rather ...
Ellen Isaacs, John C. Tang