Sciweavers

1776 search results - page 321 / 356
» Informational cascades in IT adoption
Sort
View
WWW
2005
ACM
14 years 10 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
PLDI
2009
ACM
14 years 10 months ago
SoftBound: highly compatible and complete spatial memory safety for c
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's a...
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Mar...
CHI
2009
ACM
14 years 10 months ago
Blobby: how to guide a blind person
For the majority of blind people, walking in unknown places is a very difficult, or even impossible, task to perform, when without help. The adoption of the white cane is the main...
Hugo Nicolau, Joaquim A. Jorge, Tiago João ...
CHI
2009
ACM
14 years 10 months ago
Exploring effectiveness of physical metaphor in interaction design
One direction of the emerging paradigm of interface design is the use of physical metaphors, the adoption of physical phenomenon from the real world with physical principles such ...
Sang-Su Lee, Woohun Lee
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
14 years 10 months ago
Relational learning via latent social dimensions
Social media such as blogs, Facebook, Flickr, etc., presents data in a network format rather than classical IID distribution. To address the interdependency among data instances, ...
Lei Tang, Huan Liu