Sciweavers

908 search results - page 9 / 182
» Additional methods when using email for teaching
Sort
View
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 2 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
SIGCSE
2000
ACM
119views Education» more  SIGCSE 2000»
15 years 1 months ago
Bugs as features: teaching network protocols through debugging
Being exposed to well-written code is a valuable experience for students -- especially when the code is larger or more complex than they are currently capable of writing. In addit...
Brad Richards
AUSAI
2004
Springer
15 years 1 months ago
On Enhancing the Performance of Spam Mail Filtering System Using Semantic Enrichment
With the explosive growth of the Internet, e-mails are regarded as one of the most important methods to send e-mails as a substitute for traditional communications. As e-mail has b...
Hyun-Jun Kim, Heung-Nam Kim, Jason J. Jung, GeunSi...
ECRIME
2007
15 years 1 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
ASIACRYPT
2007
Springer
15 years 3 months ago
When e-th Roots Become Easier Than Factoring
We show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the ...
Antoine Joux, David Naccache, Emmanuel Thomé...