Sciweavers

1591 search results - page 204 / 319
» The User as Navigator
Sort
View
SOUPS
2006
ACM
14 years 2 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
CAINE
2008
13 years 9 months ago
Scripted Artificially Intelligent Basic Online Tactical Simulation
For many years, introductory Computer Science courses have followed the same teaching paradigms. These paradigms utilize only simple console windows; more interactive approaches t...
Jesse D. Phillips, Roger V. Hoang, Joseph D. Mahsm...
BMCBI
2004
142views more  BMCBI 2004»
13 years 8 months ago
GOTree Machine (GOTM): a web-based platform for interpreting sets of interesting genes using Gene Ontology hierarchies
Background: Microarray and other high-throughput technologies are producing large sets of interesting genes that are difficult to analyze directly. Bioinformatics tools are needed...
Bing Zhang, Denise Schmoyer, Stefan Kirov, Jay Sno...
WWW
2010
ACM
14 years 3 months ago
A client-server architecture for state-dependent dynamic visualizations on the web
As sophisticated enterprise applications move to the Web, some advanced user experiences become difficult to migrate due to prohibitively high computation, memory, and bandwidth r...
Daniel Coffman, Danny Soroker, Chandra Narayanaswa...
SIGECOM
2010
ACM
183views ECommerce» more  SIGECOM 2010»
14 years 1 months ago
Assessing regret-based preference elicitation with the UTPREF recommendation system
Product recommendation and decision support systems must generally develop a model of user preferences by querying or otherwise interacting with a user. Recent approaches to elici...
Darius Braziunas, Craig Boutilier