Sciweavers

498 search results - page 67 / 100
» Being Sensitive to Uncertainty
Sort
View
SOUPS
2006
ACM
14 years 2 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
CSB
2005
IEEE
125views Bioinformatics» more  CSB 2005»
14 years 1 months ago
On Optimizing Distance-Based Similarity Search for Biological Databases
Similarity search leveraging distance-based index structures is increasingly being used for both multimedia and biological database applications. We consider distance-based indexi...
Rui Mao, Weijia Xu, Smriti R. Ramakrishnan, Glen N...
ICRA
2005
IEEE
142views Robotics» more  ICRA 2005»
14 years 1 months ago
Correspondenceless Ego-Motion Estimation Using an IMU
Abstract— Mobile robots can be easily equipped with numerous sensors which can aid in the tasks of localization and ego-motion estimation. Two such examples are Inertial Measurem...
Ameesh Makadia, Kostas Daniilidis
GROUP
2005
ACM
14 years 1 months ago
Uncovering privacy attitudes and practices in instant messaging
We present an analysis of privacy attitudes and practices in Instant Messaging based on responses to an online questionnaire. On a 7point Likert scale, the reported concern about ...
Sameer Patil, Alfred Kobsa