Sciweavers

1454 search results - page 66 / 291
» Modeling User Affect from Causes and Effects
Sort
View
CHI
2007
ACM
14 years 8 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
TVCG
2008
86views more  TVCG 2008»
13 years 7 months ago
The Shaping of Information by Visual Metaphors
The nature of an information visualization can be considered to lie in the visual metaphors it uses to structure information. The process of understanding a visualization therefore...
Caroline Ziemkiewicz, Robert Kosara
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 7 months ago
An Effective Anomaly Detection Method in SMTP Traffic
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu
ICDE
2009
IEEE
158views Database» more  ICDE 2009»
14 years 9 months ago
BioNav: Effective Navigation on Query Results of Biomedical Databases
Search queries on biomedical databases like PubMed often return a large number of results, only a small subset of which is relevant to the user. Ranking and categorization, which c...
Abhijith Kashyap, Vagelis Hristidis, Michalis Petr...
VIS
2008
IEEE
91views Visualization» more  VIS 2008»
14 years 9 months ago
Effective Visualization of Short Routes
In this work we develop a new alternative to conventional maps for visualization of relatively short paths as they are frequently encountered in hotels, resorts or museums. Our app...
Patrick Degener, Ruwen Schnabel, Christopher Sch...