Sciweavers

57 search results - page 8 / 12
» User Behavior Analysis of the Open-Ended Document Classifica...
Sort
View
CHI
2008
ACM
14 years 7 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
CHI
2005
ACM
14 years 7 months ago
Profile before optimizing: a cognitive metrics approach to workload analysis
The Intelligence Analyst (IA) community will soon be the designated users of many new software tools. In the multitasking world of the IA, any one tool cannot be permitted to gree...
Wayne D. Gray, Michael J. Schoelles, Christopher W...
CHI
2008
ACM
14 years 7 months ago
Friends and foes: ideological social networking
Traditional online social network sites use a single monolithic "friends" relationship to link users. However, users may have more in common with strangers, suggesting t...
Gábor Szabó, Michael J. Brzozowski, ...
ICMI
2007
Springer
100views Biometrics» more  ICMI 2007»
14 years 1 months ago
Presentation sensei: a presentation training system using speech and image processing
In this paper we present a presentation training system that observes a presentation rehearsal and provides the speaker with recommendations for improving the delivery of the pres...
Kazutaka Kurihara, Masataka Goto, Jun Ogata, Yosuk...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...