Sciweavers

142 search results - page 20 / 29
» Polite computing
Sort
View
CHI
2008
ACM
14 years 9 months ago
Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis
Although both statistical methods and visualizations have been used by network analysts, exploratory data analysis remains a challenge. We propose that a tight integration of thes...
Adam Perer, Ben Shneiderman
CHI
2009
ACM
14 years 3 months ago
Butler lies: awareness, deception and design
Instant messaging (IM) is a common and popular way for co-workers, friends, and family to stay in touch, but its “always-on” properties can sometimes lead people to feel overe...
Jeffrey T. Hancock, Jeremy P. Birnholtz, Natalya N...
SAC
2009
ACM
14 years 3 months ago
Capturing truthiness: mining truth tables in binary datasets
We introduce a new data mining problem: mining truth tables in binary datasets. Given a matrix of objects and the properties they satisfy, a truth table identifies a subset of pr...
Clifford Conley Owens III, T. M. Murali, Naren Ram...
ICNS
2007
IEEE
14 years 2 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
PDC
2004
ACM
14 years 2 months ago
Personas is not applicable: local remedies interpreted in a wider context
One of the major problems with participatory design is that it is extremely difficult to apply it to current developments. Software development for the mass market is one aspect o...
Kari Rönkkö, Mats Hellman, Britta Kiland...