Sciweavers

408 search results - page 54 / 82
» Human-centered computing in international development
Sort
View
RAID
2005
Springer
14 years 3 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
CSCW
2008
ACM
13 years 10 months ago
Context-linked virtual assistants for distributed teams: an astrophysics case study
There is a growing need for distributed teams to analyze complex and dynamic data streams and make critical decisions under time pressure. Via a case study, we discuss potential g...
Sarah S. Poon, Rollin C. Thomas, Cecilia R. Aragon...
SIGMETRICS
2004
ACM
124views Hardware» more  SIGMETRICS 2004»
14 years 3 months ago
Interposed proportional sharing for a storage service utility
This paper develops and evaluates new share-based scheduling algorithms for differentiated service quality in network services, such as network storage servers. This form of resou...
Wei Jin, Jeffrey S. Chase, Jasleen Kaur
MM
2010
ACM
265views Multimedia» more  MM 2010»
13 years 10 months ago
Affective image classification using features inspired by psychology and art theory
Images can affect people on an emotional level. Since the emotions that arise in the viewer of an image are highly subjective, they are rarely indexed. However there are situation...
Jana Machajdik, Allan Hanbury
TOCHI
1998
89views more  TOCHI 1998»
13 years 9 months ago
Using Metalevel Techniques in a Flexible Toolkit for CSCW Applications
Ideally, software toolkits for collaborative applications should provide generic, reusable components, applicable in a wide range of circumstances, which software developers can as...
Paul Dourish