Sciweavers

3511 search results - page 548 / 703
» Evaluation Methods for Groupware Systems
Sort
View
CCS
1994
ACM
14 years 14 days ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
ATAL
2009
Springer
14 years 11 days ago
Investigating the benefits of automated negotiations in enhancing people's negotiation skills
Negotiation surrounds our day-to-day lives. Research in the field of automated negotiations has suggested the design and use of automated negotiators, on one hand to allow facilit...
Raz Lin, Yinon Oshrat, Sarit Kraus
CEAS
2007
Springer
14 years 11 days ago
Learning Fast Classifiers for Image Spam
Recently, spammers have proliferated "image spam", emails which contain the text of the spam message in a human readable image instead of the message body, making detect...
Mark Dredze, Reuven Gevaryahu, Ari Elias-Bachrach
SOUPS
2010
ACM
14 years 8 days ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
CIKM
2006
Springer
14 years 3 days ago
SaLSa: computing the skyline without scanning the whole sky
Skyline queries compute the set of Pareto-optimal tuples in a relation, i.e., those tuples that are not dominated by any other tuple in the same relation. Although several algorit...
Ilaria Bartolini, Paolo Ciaccia, Marco Patella