Sciweavers

1172 search results - page 136 / 235
» Who killed design
Sort
View
WISEC
2010
ACM
16 years 7 days ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
CHI
2010
ACM
16 years 3 days ago
FeedWinnower: layering structures over collections of information streams
Information overload is a growing threat to the productivity of today’s knowledge workers, who need to keep track of multiple streams of information from various sources. RSS fe...
Lichan Hong, Gregorio Convertino, Bongwon Suh, Ed ...
SBP
2010
Springer
16 years 3 days ago
Social Factors in Creating an Integrated Capability for Health System Modeling and Simulation
Abstract. The health system is a complex system of systems – changes in agriculture, transportation, economics, family life, medical practices, and many other things can have a p...
Paul P. Maglio, Melissa Cefkin, Peter J. Haas, Pat...
135
Voted
ACSAC
2009
IEEE
16 years 2 days ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
HICSS
2009
IEEE
129views Biometrics» more  HICSS 2009»
16 years 2 days ago
Using Collaborative Filtering Algorithms as eLearning Tools
Collaborative information filtering techniques play a key role in many Web 2.0 applications. While they are currently mainly used for business purposes such as product recommendat...
Frank Loll, Niels Pinkwart