Sciweavers

274 search results - page 4 / 55
» Security user studies: methodologies and best practices
Sort
View
CHI
2010
ACM
14 years 2 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
ACMDIS
2006
ACM
14 years 1 months ago
What do usability evaluators do in practice?: an explorative study of think-aloud testing
Think-aloud testing is a widely employed usability evaluation method, yet its use in practice is rarely studied. We report an explorative study of 14 think-aloud sessions, the aud...
Mie Nørgaard, Kasper Hornbæk
VLDB
2005
ACM
175views Database» more  VLDB 2005»
14 years 26 days ago
Catching the Best Views of Skyline: A Semantic Approach Based on Decisive Subspaces
The skyline operator is important for multicriteria decision making applications. Although many recent studies developed efficient methods to compute skyline objects in a specifi...
Jian Pei, Wen Jin, Martin Ester, Yufei Tao
HICSS
1999
IEEE
137views Biometrics» more  HICSS 1999»
13 years 11 months ago
A Methodology for Evaluating and Selecting Data Mining Software
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
SUTC
2006
IEEE
14 years 1 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...