Abstract. How could one estimate the total number of clicks a new advertisement could potentially receive in the current market? This question, called the click volume estimation p...
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
Constructing some regular graph with a given girth, a given degree and the fewest possible vertices is a hard problem. This problem is called the cage graph problem and has some l...
With the advance of pervasive technology, information from both the physical and virtual world is increasingly accessible to developers. Context -aware applications may consume re...
Automatic classification of dialogues between clients and a service center needs a preliminary dialogue parameterization. Such a parameterization is usually faced with essential di...