Sciweavers

1276 search results - page 221 / 256
» Vetting the links of the web
Sort
View
GROUP
1997
ACM
14 years 1 months ago
The CDT mStar environment: scalable distributed teamwork in action
This paper presents the mStar environment, which creates an environment for truly scalable distributed teamwork. It can be and is being used on a daily basis for electronic meetin...
Peter Parnes, Kåre Synnes, Dick Schefstr&oum...
ECRIME
2007
14 years 1 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
FC
2010
Springer
160views Cryptology» more  FC 2010»
14 years 1 months ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
CANDT
2009
14 years 1 months ago
Facilitating participatory decision-making in local communities through map-based online discussion
Geographic information systems and online mapping technologies have been widely used for supporting participatory decision-making in local communities. However, limited studies ha...
Bo Yu, Guoray Cai
KDD
2010
ACM
244views Data Mining» more  KDD 2010»
14 years 1 months ago
Connecting the dots between news articles
The process of extracting useful knowledge from large datasets has become one of the most pressing problems in today’s society. The problem spans entire sectors, from scientists...
Dafna Shahaf, Carlos Guestrin