Sciweavers

524 search results - page 40 / 105
» Why phishing works
Sort
View
ICDE
2003
IEEE
107views Database» more  ICDE 2003»
14 years 10 months ago
Managing Data Mappings in the Hyperion Project
We consider the problem of mapping data in peerto-peer systems. Such systems rely on simple value searches to locate data of interest. However, different peers may use different v...
Anastasios Kementsietsidis, Marcelo Arenas, Ren&ea...
CHI
2006
ACM
14 years 9 months ago
In search of end-users
Learning from end-users is essential to participatory design. In order to learn from end-users we need to find end-users to collaborate with. However, finding end-users can be the...
Rachel K. E. Bellamy, Tracee Vetting Wolf, Rhonda ...
CHI
2004
ACM
14 years 8 months ago
A cognitive meta-analysis of design approaches to interruptions in intelligent environments
Minimizing interruptions to users is a crucial and acknowledged precondition for the adoption of new intelligent technologies such as ubiquitous and proactive computing. This pape...
Antti Oulasvirta, Antti Salovaara
COMPSAC
2009
IEEE
14 years 3 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
CANDC
2009
ACM
14 years 3 months ago
Predicting successful completion of online collaborative animation projects
Online creative collaboration projects are started every day, but many fail to produce new artifacts of value. In this poster, we address the question of why some of these project...
Kurt Luther, Kevin Ziegler, Kelly E. Caine, Amy Br...