Sciweavers

35419 search results - page 44 / 7084
» How are we doing
Sort
View
EDM
2009
127views Data Mining» more  EDM 2009»
13 years 6 months ago
How do Students Organize Personal Information Spaces?
The purpose of this study is to empirically reveal strategies of students' organization of learning-related digital materials within an online personal information archive. Re...
Sharon Hardof-Jaffe, Arnon Hershkovitz, Hama Abu-K...
CHI
2006
ACM
14 years 9 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
NDSS
2003
IEEE
14 years 1 months ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava