Sciweavers

2214 search results - page 318 / 443
» Initial Design of the
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
SIGIR
2004
ACM
14 years 2 months ago
Eye-tracking analysis of user behavior in WWW search
We investigate how users interact with the results page of a WWW search engine using eye-tracking. The goal is to gain into how users browse the presented abstracts and how they s...
Laura A. Granka, Thorsten Joachims, Geri Gay
WS
2004
ACM
14 years 2 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
ATAL
2004
Springer
14 years 2 months ago
Agent-Based Peer-to-Peer Service Networks: A Study of Effectiveness and Structure Evolution
We study peer-to-peer service networks consisting of autonomous agents who seek and provide services. To fulfill its local needs, an agent attempts to discover and select informa...
Yathiraj B. Udupi, Pinar Yolum, Munindar P. Singh
CASSIS
2004
Springer
14 years 2 months ago
ESC/Java2: Uniting ESC/Java and JML
The ESC/Java tool was a lauded advance in effective static checking of realistic Java programs, but has become out-of-date with respect to Java and the Java Modeling Language (JML...
David R. Cok, Joseph Kiniry