Sciweavers

1519 search results - page 189 / 304
» What do they think
Sort
View
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 11 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
CHI
2008
ACM
14 years 11 months ago
Sustainable millennials: attitudes towards sustainability and the material effects of interactive technologies
This paper describes the design and interprets the results of a survey of 435 undergraduate students concerning the attitudes of this mainly millennial population towards sustaina...
Kristin Hanks, William Odom, David Roedl, Eli Blev...
CHI
2007
ACM
14 years 11 months ago
Coordinating joint activity in avatar-mediated interaction
Massively multiplayer online games (MMOGs) currently represent the most widely used type of social 3D virtual worlds with millions of users worldwide. Although MMOGs take face-to-...
Robert J. Moore, E. Cabell Hankinson Gathman, Nico...
CHI
2007
ACM
14 years 11 months ago
Understanding videowork
In this paper we elucidate the patterns of behavior of home movie makers through a study of 12 families and a separate focus group of 7 teenagers. Analogous to a similar study of ...
David S. Kirk, Abigail Sellen, Richard H. R. Harpe...
CHI
2006
ACM
14 years 11 months ago
Broken expectations in the digital home
As part of an ongoing effort to understand ease of use of digital home technologies, we undertook an exploratory study of people who use their home networks for more than just bro...
Sara A. Bly, Bill N. Schilit, David W. McDonald, B...