Sciweavers

3602 search results - page 202 / 721
» Isn't It About Time
Sort
View
CHI
2006
ACM
14 years 11 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2005
ACM
14 years 11 months ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
CHI
2004
ACM
14 years 11 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
ICCD
2005
IEEE
101views Hardware» more  ICCD 2005»
14 years 7 months ago
Restrictive Compression Techniques to Increase Level 1 Cache Capacity
Increasing cache latencies limit L1 cache sizes. In this paper we investigate restrictive compression techniques for level 1 data cache, to avoid an increase in the cache access l...
Prateek Pujara, Aneesh Aggarwal
SIGMOD
2009
ACM
186views Database» more  SIGMOD 2009»
14 years 5 months ago
What's on the grapevine?
User generated content and social media (in the form of blogs, wikis, online video, microblogs, etc) are proliferating online. Grapevine conducts large scale data analysis on the ...
Albert Angel, Nick Koudas, Nikos Sarkas, Divesh Sr...