Sciweavers

7839 search results - page 1286 / 1568
» What's there and what's not
Sort
View
CCS
2009
ACM
16 years 2 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
CCS
2009
ACM
16 years 2 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
CHI
2009
ACM
16 years 2 months ago
Visualizing remote voice conversations
Online voice conversations are becoming ever more popular. People have been logging online text conversations, but what about voice conversations? Walter Ong simply states, "...
Pooja Mathur, Karrie Karahalios
CHI
2009
ACM
16 years 2 months ago
Productive love: a new approach for designing affective technology
The importance of love is reflected in literature, movies and music, therefore it seems necessary to understand what role technology plays in relation to love and the roles it cou...
Ramon Solves Pujol, Hiroyuki Umemuro
CHI
2009
ACM
16 years 2 months ago
Predicting query reformulation during web searching
This paper reports results from a study in which we automatically classified the query reformulation patterns for 964,780 Web searching sessions (composed of 1,523,072 queries) in...
Bernard J. Jansen, Danielle L. Booth, Amanda Spink
« Prev « First page 1286 / 1568 Last » Next »