Sciweavers

1111 search results - page 172 / 223
» Understanding Egocentric Activities
Sort
View
HICSS
2011
IEEE
241views Biometrics» more  HICSS 2011»
13 years 2 months ago
Examining Work Performance in Immersive Virtual Environments versus Face-to-Face Physical Environments through Laboratory Experi
With increasing proliferation of virtual environments for serious work as well as play, we are confronted by new challenges pertaining to how such environments can be leveraged to...
Richard Bergin, Bryan J. Hudgens, Mark Nissen
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 2 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 2 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
CHI
2011
ACM
13 years 2 months ago
Modern software product support processes and the usage of multimedia formats
Despite being an important channel for end-user assistance, few studies have directly investigated the interactions that occur in modern-day practice of software product support. ...
Parmit K. Chilana, Tovi Grossman, George W. Fitzma...
CHI
2011
ACM
13 years 2 months ago
HyperSource: bridging the gap between source and code-related web sites
Programmers frequently use the Web while writing code: they search for libraries, code examples, tutorials, and documentation. This link between code and visited Web pages remains...
Björn Hartmann, Mark Dhillon, Matthew K. Chan