Sciweavers

1413 search results - page 236 / 283
» ideas 2007
Sort
View
ECRIME
2007
15 years 7 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
BCSHCI
2007
15 years 5 months ago
An empirical investigation into dual-task trade-offs while driving and dialing
Engaging in a secondary task, such as dialing a cell phone, while driving a car has been found to have a deleterious effect on driver performance. A point often overlooked though ...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
136
Voted
BCSHCI
2007
15 years 5 months ago
Design, use and experience of e-learning systems
The use of computer applications to support learning and assessment is becoming more common, along with a growing body of research focusing on the pedagogical effectiveness of the...
Willem-Paul Brinkman, Annette Payne, Nayna Patel, ...
140
Voted
BPSC
2007
171views Business» more  BPSC 2007»
15 years 5 months ago
XML Databases: Principles and Usage
Originally XML was used as a standard protocol for data exchange in computing. The evolution of information technology has opened up new situations in which XML can be used to aut...
Jaroslav Pokorný
DAGSTUHL
2007
15 years 5 months ago
What is Input/Output Logic? Input/Output Logic, Constraints, Permissions
We explain the raison d’ˆetre and basic ideas of input/output logic, sketching the central elements with pointers to other publications for detailed developments. The motivation...
David Makinson, Leendert W. N. van der Torre