Sciweavers

1288 search results - page 215 / 258
» Understanding the Hidden Web
Sort
View
SOUPS
2006
ACM
14 years 1 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ERCIMDL
2005
Springer
124views Education» more  ERCIMDL 2005»
14 years 1 months ago
A Comparison of On-Line Computer Science Citation Databases
This paper examines the difference and similarities between the two on-line computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manual...
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G....
MIDDLEWARE
2005
Springer
14 years 1 months ago
I-RMI: Performance Isolation in Information Flow Applications
A problem with many distributed applications is their behavior in lieu of unpredictable variations in user request volumes or in available resources. This paper explores a performa...
Mohamed S. Mansour, Karsten Schwan
NORDICHI
2004
ACM
14 years 1 months ago
Two psychology-based usability inspection techniques studied in a diary experiment
Inspection techniques are widely used during systems design as a supplement to empirical evaluations of usability. Psychology-based inspection techniques could give important insi...
Kasper Hornbæk, Erik Frøkjær
SIGCSE
2004
ACM
111views Education» more  SIGCSE 2004»
14 years 1 months ago
Events not equal to GUIs
The event driven paradigm is ubiquitous in modern software. Many texts introduce events when discussing graphical user interfaces, but the event paradigm extends well beyond that ...
Stuart A. Hansen, Timothy V. Fossum