Sciweavers

3330 search results - page 538 / 666
» software 2010
Sort
View
CHI
2010
ACM
15 years 11 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
EUROSEC
2010
ACM
15 years 11 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...
SAC
2010
ACM
15 years 11 months ago
Towards mobile process as a service
Process as a Service (PaaS) addresses modeling, execution and management of business processes without running extensive and costly process management software. Such a flexible o...
Sonja Zaplata, Winfried Lamersdorf
SAC
2010
ACM
15 years 11 months ago
Referrer graph: a low-cost web prediction algorithm
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...
B. de la Ossa, Ana Pont, Julio Sahuquillo, Jos&eac...
253
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 11 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto