Sciweavers

578 search results - page 66 / 116
» Making PRIME usable
Sort
View
SIGSOFT
2008
ACM
14 years 10 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
WWW
2008
ACM
14 years 10 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
WWW
2008
ACM
14 years 10 months ago
Action science approach to nonprofit housing services using web 2.0 mapping tools
The study follows action science approach to the problem of nonprofit housing services. After 4 months of action sciencebased activities, such as organized participant observation...
Yao-Jen Chang, Hsin-Yu Hsu, Tsen-Yung Wang
WWW
2006
ACM
14 years 10 months ago
Template guided association rule mining from XML documents
Compared with traditional association rule mining in the structured world (e.g. Relational Databases), mining from XML data is confronted with more challenges due to the inherent ...
Rahman Ali Mohammadzadeh, Sadegh Soltan, Masoud Ra...
CHI
2009
ACM
14 years 10 months ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...