Sciweavers

1172 search results - page 136 / 235
» Who killed design
Sort
View
WISEC
2010
ACM
14 years 5 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CHI
2010
ACM
14 years 5 months ago
FeedWinnower: layering structures over collections of information streams
Information overload is a growing threat to the productivity of today’s knowledge workers, who need to keep track of multiple streams of information from various sources. RSS fe...
Lichan Hong, Gregorio Convertino, Bongwon Suh, Ed ...
SBP
2010
Springer
14 years 5 months ago
Social Factors in Creating an Integrated Capability for Health System Modeling and Simulation
Abstract. The health system is a complex system of systems – changes in agriculture, transportation, economics, family life, medical practices, and many other things can have a p...
Paul P. Maglio, Melissa Cefkin, Peter J. Haas, Pat...
ACSAC
2009
IEEE
14 years 5 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
14 years 5 months ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart