Sciweavers

15379 search results - page 212 / 3076
» Protecting users from
Sort
View
IEPOL
2006
57views more  IEPOL 2006»
13 years 8 months ago
Multi-level markets and incentives for information goods
The free-rider phenomenon which impedes the marketing of information goods is conventionally countered by copyright protection regulations and technology. Alternative ways to mark...
Andreas U. Schmidt
SEKE
2005
Springer
14 years 1 months ago
From Data to Knowledge: an Integrated Rule-Based Data Mining System
This paper presents an integrated rule-based data mining system that is capable of creating rulebased classifiers with web-based user interface from data sets provided by end user...
Chien-Chung Chan, Zhicheng Su
CHI
2005
ACM
14 years 8 months ago
Beyond "from" and "received": exploring the dynamics of email triage
Email triage is the process of going through unhandled email and deciding what to do with it. Email triage can quickly become a serious problem for users as the amount of unhandle...
Carman Neustaedter, A. J. Bernheim Brush, Marc A. ...
CHI
2011
ACM
12 years 11 months ago
From the lab to the world: lessons from extending a pointing technique for real-world use
We present the Pointing Magnifier as a case study for understanding the issues and challenges of deploying lab-validated pointing facilitation techniques into the real world. The ...
Alex Jansen, Leah Findlater, Jacob O. Wobbrock
CCS
2009
ACM
14 years 8 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen