Sciweavers

10820 search results - page 1922 / 2164
» Understanding the
Sort
View
SIGIR
2010
ACM
14 years 2 months ago
The good, the bad, and the random: an eye-tracking study of ad quality in web search
We investigate how people interact with Web search engine result pages using eye-tracking. While previous research has focused on the visual attention devoted to the 10 organic se...
Georg Buscher, Susan T. Dumais, Edward Cutrell
SOUPS
2010
ACM
14 years 2 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...
SOUPS
2010
ACM
14 years 2 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
SOUPS
2010
ACM
14 years 2 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
GECCO
2007
Springer
258views Optimization» more  GECCO 2007»
14 years 2 months ago
TFBS identification by position- and consensus-led genetic algorithm with local filtering
Identification of Transcription Factor Binding Site (TFBS) motifs in multiple DNA upstream sequences is important in understanding the mechanism of gene regulation. This identific...
Tak-Ming Chan, Kwong-Sak Leung, Kin-Hong Lee
« Prev « First page 1922 / 2164 Last » Next »