Sciweavers

15379 search results - page 2824 / 3076
» Protecting users from
Sort
View
CHI
2009
ACM
16 years 5 months ago
EyeSpy: supporting navigation through play
This paper demonstrates how useful content can be generated as a by-product of an enjoyable mobile multiplayer game. In EyeSpy, players tag geographic locations with photos or tex...
Marek Bell, Stuart Reeves, Barry Brown, Scott Sher...
CHI
2009
ACM
16 years 5 months ago
Exploring effectiveness of physical metaphor in interaction design
One direction of the emerging paradigm of interface design is the use of physical metaphors, the adoption of physical phenomenon from the real world with physical principles such ...
Sang-Su Lee, Woohun Lee
KDD
2008
ACM
147views Data Mining» more  KDD 2008»
16 years 5 months ago
Mobile call graphs: beyond power-law and lognormal distributions
We analyze a massive social network, gathered from the records of a large mobile phone operator, with more than a million users and tens of millions of calls. We examine the distr...
Mukund Seshadri, Sridhar Machiraju, Ashwin Sridhar...
KDD
2006
ACM
173views Data Mining» more  KDD 2006»
16 years 5 months ago
Robust information-theoretic clustering
How do we find a natural clustering of a real world point set, which contains an unknown number of clusters with different shapes, and which may be contaminated by noise? Most clu...
Christian Böhm, Christos Faloutsos, Claudia P...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 5 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
« Prev « First page 2824 / 3076 Last » Next »