Sciweavers

524 search results - page 35 / 105
» Why phishing works
Sort
View
ESA
2004
Springer
117views Algorithms» more  ESA 2004»
14 years 1 months ago
Classroom Examples of Robustness Problems in Geometric Computations
The algorithms of computational geometry are designed for a machine model with exact real arithmetic. Substituting floating-point arithmetic for the assumed real arithmetic may c...
Lutz Kettner, Kurt Mehlhorn, Sylvain Pion, Stefan ...
CHI
2010
ACM
14 years 1 months ago
Clutching at straws: using tangible interaction to provide non-visual access to graphs
We present a tangible user interface (TUI) called Tangible Graph Builder, that has been designed to allow visually impaired users to access graph and chart-based data. We describe...
David K. McGookin, Euan Robertson, Stephen A. Brew...
DSN
2002
IEEE
14 years 1 months ago
Robust Software - No More Excuses
Software developers identify two main reasons why software systems are not made robust: performance and practicality. This work demonstrates the effectiveness of general technique...
John DeVale, Philip Koopman
KR
2010
Springer
14 years 1 months ago
The Temporal Logic of Token Causes
While type causality helps us to understand general relationships such as the etiology of a disease (smoking causing lung cancer), token causality aims to explain causal connectio...
Samantha Kleinberg, Bud Mishra
CSCW
2000
ACM
14 years 26 days ago
Explaining collaborative filtering recommendations
Automated collaborative filtering (ACF) systems predict a person’s affinity for items or information by connecting that person’s recorded interests with the recorded interests...
Jonathan L. Herlocker, Joseph A. Konstan, John Rie...