Sciweavers

897 search results - page 36 / 180
» Identity: How to name it, How to find it
Sort
View
CHI
2011
ACM
13 years 8 days ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
AI
2004
Springer
13 years 8 months ago
A unifying semantics for time and events
We give a formal semantics for a highly expressive language for representing temporal relationships and events. This language, which we call Versatile Event Logic (VEL), provides ...
Brandon Bennett, Antony Galton
SSD
2001
Springer
218views Database» more  SSD 2001»
14 years 1 months ago
Efficient Mining of Spatiotemporal Patterns
The problem of mining spatiotemporal patterns is finding sequences of events that occur frequently in spatiotemporal datasets. Spatiotemporal datasets store the evolution of object...
Ilias Tsoukatos, Dimitrios Gunopulos
HASKELL
2007
ACM
14 years 16 days ago
A type-preserving closure conversion in haskell
The use of typed intermediate languages can significantly increase the reliability of a compiler. By type-checking the code produced at each transformation stage, one can identify...
Louis-Julien Guillemette, Stefan Monnier
CHI
2010
ACM
14 years 3 months ago
Homeless young people's experiences with information systems: life and work in a community technology center
This paper explores how homeless young people, aged 1325, make use of information systems in daily life. Observed in a community technology center, four different examples of uses...
Jill Palzkill Woelfer, David G. Hendry