Sciweavers

1166 search results - page 233 / 234
» Question Answering Using a Large NLP System
Sort
View
ECRIME
2007
13 years 9 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
WSDM
2012
ACM
290views Data Mining» more  WSDM 2012»
12 years 24 days ago
Online selection of diverse results
The phenomenal growth in the volume of easily accessible information via various web-based services has made it essential for service providers to provide users with personalized ...
Debmalya Panigrahi, Atish Das Sarma, Gagan Aggarwa...
ICSE
2007
IEEE-ACM
14 years 5 months ago
A Future for Software Engineering?
This paper suggests the need for a software engineering research community conversation about the future that the community would like to have. The paper observes that the researc...
Leon J. Osterweil
LCN
2006
IEEE
13 years 11 months ago
On Access Point Selection in IEEE 802.11 Wireless Local Area Networks
In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select “bestâ€...
Murad Abusubaih, James Gross, Sven Wiethölter...
DIGRA
2005
Springer
13 years 10 months ago
Early Games Production in New Zealand
This illustrated paper reports on the early digital games industry in New Zealand, during the late 1970s and 80s. It presents an overview of this largely unknown history, drawing ...
Melanie Swalwell