Sciweavers

2316 search results - page 427 / 464
» How Asymmetric Is the Internet
Sort
View
SIGSOFT
2002
ACM
16 years 5 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...
CCS
2009
ACM
16 years 4 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
KDD
2002
ACM
196views Data Mining» more  KDD 2002»
16 years 4 months ago
Comparing Two Recommender Algorithms with the Help of Recommendations by Peers
Abstract. Since more and more Web sites, especially sites of retailers, offer automatic recommendation services using Web usage mining, evaluation of recommender algorithms has bec...
Andreas Geyer-Schulz, Michael Hahsler
CHI
2006
ACM
16 years 4 months ago
Share and share alike: exploring the user interface affordances of file sharing
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, a...
Stephen Voida, W. Keith Edwards, Mark W. Newman, R...
CHI
2006
ACM
16 years 4 months ago
Sexual interactions: why we should talk about sex in HCI
Within the CHI community there is growing interest in moving beyond cognition and expanding into the social, emotional, and bodily aspects of the human-computer experience. Sex li...
Johanna Brewer, Joseph Kaye, Amanda Williams, Susa...