Sciweavers

3010 search results - page 550 / 602
» Challenges in Visual Data Analysis
Sort
View
CHIMIT
2007
ACM
14 years 26 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ACMSE
2007
ACM
14 years 25 days ago
Change propagations in the maintenance of kernel-based software with a study on Linux
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
Liguo Yu, Srini Ramaswamy
CIKM
2008
Springer
13 years 11 months ago
Representative entry selection for profiling blogs
Many applications on blog search and mining often meet the challenge of handling huge volume of blog data, in which one single blog could contain hundreds or even thousands of ent...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun, Rong ...
ESEM
2008
ACM
13 years 10 months ago
Socio-technical congruence: a framework for assessing the impact of technical and work dependencies on software development prod
The identification and management of work dependencies is a fundamental challenge in software development organizations. This paper argues that modularization, the traditional tec...
Marcelo Cataldo, James D. Herbsleb, Kathleen M. Ca...
DIMVA
2007
13 years 10 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...