Sciweavers

15379 search results - page 294 / 3076
» Protecting users from
Sort
View
UTP
2010
13 years 6 months ago
On Modelling User Observations in the UTP
This paper presents an approach for modelling interactions between users and systems in the Unifying Theories of Programming. Working in the predicate calculus, we outline generic ...
Michael J. Banks, Jeremy L. Jacob
TELSYS
2010
132views more  TELSYS 2010»
13 years 3 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
WWW
2007
ACM
14 years 9 months ago
Delay tolerant applications for low bandwidth and intermittently connected users: the aAQUA experience
With the explosive growth and spread of Internet, web access from mobile and rural users has become significant. But these users face problems of low bandwidth and intermittent In...
Saurabh Sahni, Krithi Ramamritham
CHI
2009
ACM
14 years 9 months ago
Understanding, scoping and defining user experience: a survey approach
Despite the growing interest in user experience (UX), it has been hard to gain a common agreement on the nature and scope of UX. In this paper, we report a survey that gathered th...
Effie Lai-Chong Law, Virpi Roto, Marc Hassenzahl, ...
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
14 years 8 months ago
Mining unexpected rules by pushing user dynamics
Unexpected rules are interesting because they are either previously unknown or deviate from what prior user knowledge would suggest. In this paper, we study three important issues...
Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan