Sciweavers

524 search results - page 18 / 105
» Why phishing works
Sort
View
SIGDOC
2006
ACM
14 years 2 months ago
Why don't people read the manual?
Few users of computer applications seek help from the documentation. This paper reports the results of an empirical study of why this is so and examines how, in real work, users s...
David G. Novick, Karen Ward
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 21 days ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
KDD
2004
ACM
170views Data Mining» more  KDD 2004»
14 years 8 months ago
Why collective inference improves relational classification
Procedures for collective inference make simultaneous statistical judgments about the same variables for a set of related data instances. For example, collective inference could b...
David Jensen, Jennifer Neville, Brian Gallagher
ICSE
2003
IEEE-ACM
14 years 8 months ago
Why Can't They Create Architecture Models Like "Developer X"? An Experience Report
A large financial company, struggling with legacy systems that did not interoperate, performed a pilot project to teach software architecture to an enthusiastic application develo...
George Fairbanks
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 3 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...