Sciweavers

276 search results - page 3 / 56
» The Effectiveness of Whitelisting: a User-Study
Sort
View
SOUPS
2005
ACM
14 years 1 months ago
Stopping spyware at the gate: a user study of privacy, notice and spyware
Spyware is a significant problem for most computer users. The term “spyware” loosely describes a new class of computer software. This type of software may track user activitie...
Nathaniel Good, Rachna Dhamija, Jens Grossklags, D...
CEAS
2005
Springer
14 years 1 months ago
SMTP Path Analysis
Most proponents of domain authentication suggest combining domain authentication with reputation services. This paper presents a new learning algorithm for learning the reputation...
Barry Leiba, Joel Ossher, V. T. Rajan, Richard Seg...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
14 years 1 months ago
Combining Speak-Up with DefCOM for Improved DDoS Defense
—This work combines two existing defenses against distributed denial-of-service (DDoS) attacks DefCOM and Speak-up resulting in a synergistic improvement. DefCOM defense organize...
Mohit Mehta, Kanika Thapar, George C. Oikonomou, J...
GRAPHICSINTERFACE
2009
13 years 5 months ago
Parallax photography: creating 3D cinematic effects from stills
We present an approach to convert a small portion of a light field with extracted depth information into a cinematic effect with simulated, smooth camera motion that exhibits a se...
Ke Colin Zheng, Alex Colburn, Aseem Agarwala, Mane...
CHI
2011
ACM
12 years 11 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...