Sciweavers

2795 search results - page 414 / 559
» Recommendations on recommendations
Sort
View
APGV
2010
ACM
242views Visualization» more  APGV 2010»
14 years 4 days ago
The perception of finger motions
In this paper, we explore the perception of finger motions of virtual characters. In three experiments, designed to investigate finger animations, we asked the following questio...
Sophie Jörg, Jessica K. Hodgins, Carol O'Sull...
SOUPS
2010
ACM
14 years 3 days ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
14 years 3 days ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
GROUP
2007
ACM
14 years 3 days ago
Supporting creativity with awareness in distributed collaboration
Based on qualitative analysis of three groups collaborating on a research task in a distributed setting, we identify four breakdowns in creativity: (1) Minority ideas were under-c...
Umer Farooq, John M. Carroll, Craig H. Ganoe
GROUP
2007
ACM
14 years 3 days ago
Creating, destroying, and restoring value in wikipedia
Wikipedia's brilliance and curse is that any user can edit any of the encyclopedia entries. We introduce the notion of the impact of an edit, measured by the number of times ...
Reid Priedhorsky, Jilin Chen, Shyong K. Lam, Kathe...