Sciweavers

327 search results - page 40 / 66
» Assessing the Assessment: an Empirical Study of an Informati...
Sort
View
CHI
2006
ACM
14 years 9 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
IJCAI
1997
13 years 10 months ago
Aggregating Features and Matching Cases on Vague Linguistic Expressions
Decision making based on the comparison of multiple criteria of two or more alternatives, is the subject of intensive research. In many decision making situations, a single criter...
Alfons Schuster, Werner Dubitzky, Philippe Lopes, ...
IAAI
1993
13 years 10 months ago
Dodger, a Diagnostic Expert System for the Evaluation of Nondestructive Test Data
Identification and characterization of indications in eddy current (ET) signals can be highly subjective in nature, with varying diagnoses made by different analysts or by a singl...
Arthur J. Levy, Jane E. Oppenlander, David M. Brud...
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 9 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
COMCOM
2010
133views more  COMCOM 2010»
13 years 9 months ago
Measuring long-term location privacy in vehicular communication systems
Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many ...
Zhendong Ma, Frank Kargl, Michael Weber