Sciweavers

2846 search results - page 38 / 570
» Not one click for security
Sort
View
ICISS
2007
Springer
15 years 10 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
WWW
2008
ACM
16 years 4 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
PERCOM
2004
ACM
16 years 3 months ago
Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing
One way to improve inferences on sensor data is to tune the algorithms through a time-consuming offline procedure. A less expensive, and potentially more accurate method is to use...
Ezekiel S. Bhasker, Steven W. Brown, William G. Gr...
PARA
2004
Springer
15 years 9 months ago
Automatic Derivation of Linear Algebra Algorithms with Application to Control Theory
It is our belief that the ultimate automatic system for deriving linear algebra libraries should be able to generate a set of algorithms starting from the mathematical specificati...
Paolo Bientinesi, Sergey Kolos, Robert A. van de G...
SAINT
2003
IEEE
15 years 9 months ago
Bayesian Analysis of Online Newspaper Log Data
In this paper we address the problem of analyzing web log data collected at a typical online newspaper site. We propose a two-way clustering technique based on probability theory....
Hannes Wettig, Jussi Lahtinen, Tuomas Lepola, Petr...