Sciweavers

4415 search results - page 818 / 883
» How to Pair with a Human
Sort
View
SIGIR
2010
ACM
14 years 18 days ago
Context-aware ranking in web search
The context of a search query often provides a search engine meaningful hints for answering the current query better. Previous studies on context-aware search were either focused ...
Biao Xiang, Daxin Jiang, Jian Pei, Xiaohui Sun, En...
SOUPS
2010
ACM
14 years 18 days ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
CCECE
2006
IEEE
14 years 14 days ago
Modelling and Emulation of Multifractal Noise in Performance Evaluation of Mesh Networks
This paper describes a model and a setup for emulating fractal and multifractal noise for the measurement and evaluation of performance of ZigBee mesh networks intended for harsh ...
Lily Woo, Witold Kinsner, Ken Ferens, J. Diamond
CCS
2006
ACM
14 years 14 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
SPATIALCOGNITION
2000
Springer
14 years 9 days ago
Interactive Layout Generation with a Diagrammatic Constraint Language
The paper analyzes a diagrammatic reasoning problem that consists in finding a graphical layout which simultaneously satisfies a set of constraints expressed in a formal language a...
Christoph Schlieder, Cornelius Hagen