Sciweavers

524 search results - page 35 / 105
» Why phishing works
Sort
View
ESA
2004
Springer
117views Algorithms» more  ESA 2004»
15 years 5 months ago
Classroom Examples of Robustness Problems in Geometric Computations
The algorithms of computational geometry are designed for a machine model with exact real arithmetic. Substituting floating-point arithmetic for the assumed real arithmetic may c...
Lutz Kettner, Kurt Mehlhorn, Sylvain Pion, Stefan ...
CHI
2010
ACM
15 years 5 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...
DSN
2002
IEEE
15 years 4 months ago
Robust Software - No More Excuses
Software developers identify two main reasons why software systems are not made robust: performance and practicality. This work demonstrates the effectiveness of general technique...
John DeVale, Philip Koopman
KR
2010
Springer
15 years 4 months ago
The Temporal Logic of Token Causes
While type causality helps us to understand general relationships such as the etiology of a disease (smoking causing lung cancer), token causality aims to explain causal connectio...
Samantha Kleinberg, Bud Mishra
CSCW
2000
ACM
15 years 4 months ago
Explaining collaborative filtering recommendations
Automated collaborative filtering (ACF) systems predict a person’s affinity for items or information by connecting that person’s recorded interests with the recorded interests...
Jonathan L. Herlocker, Joseph A. Konstan, John Rie...