Sciweavers

63 search results - page 6 / 13
» Investigating user account control practices
Sort
View
CSCW
2002
ACM
13 years 7 months ago
Instant messaging in teen life
Instant Messaging (IM) is being widely adopted by teenagers. In a study of 16 teenage IM users, we explore IM as an emerging feature of teen life, focusing our questions on its su...
Rebecca E. Grinter, Leysia Palen
CEAS
2011
Springer
12 years 7 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...
JCDL
2010
ACM
161views Education» more  JCDL 2010»
13 years 5 months ago
Search behaviors in different task types
Personalization of information retrieval tailors search towards individual users to meet their particular information needs by taking into account information about users and thei...
Jingjing Liu, Michael J. Cole, Chang Liu, Ralf Bie...
QOFIS
2001
Springer
14 years 1 days ago
Constrained TCP-Friendly Congestion Control for Multimedia Communication
With the lack of admission control and resource reservation mechanisms in the Internet, overload situations can only be avoided by having the end systems deploying congestion cont...
Dorgham Sisalem, Adam Wolisz
SACMAT
2006
ACM
14 years 1 months ago
Fine-grained role-based delegation in presence of the hybrid role hierarchy
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
James B. D. Joshi, Elisa Bertino