Sciweavers

1734 search results - page 295 / 347
» What works
Sort
View
ESEM
2009
ACM
14 years 4 months ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
SIGCOMM
2009
ACM
14 years 4 months ago
Hot today, gone tomorrow: on the migration of MySpace users
While some empirical studies on Online Social Networks (OSNs) have examined the growth of these systems, little is known about the patterns of decline in user population or user a...
Mojtaba Torkjazi, Reza Rejaie, Walter Willinger
SIGCOMM
2009
ACM
14 years 4 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
WIKIS
2009
ACM
14 years 4 months ago
Organizing the vision for web 2.0: a study of the evolution of the concept in Wikipedia
Information Systems (IS) innovations are often characterized by buzzwords, reflecting organizing visions that structure and express the images and ideas formed by a wide community...
Arnaud Gorgeon, E. Burton Swanson
CHI
2010
ACM
14 years 4 months ago
Quasi-qwerty soft keyboard optimization
It has been well understood that optimized soft keyboard layouts improve motor movement efficiency over the standard Qwerty layouts, but have the drawback of long initial visual s...
Xiaojun Bi, Barton A. Smith, Shumin Zhai