Sciweavers

165 search results - page 28 / 33
» Cloud Computing - The Next Revolution in Information Technol...
Sort
View
DIM
2008
ACM
14 years 10 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
ICWL
2005
Springer
15 years 3 months ago
Grounding Collaborative Knowledge Building in Semantics-Based Critiquing
In this paper we investigate the use of Latent Semantic Analysis (LSA), Critiquing Systems, and Knowledge Building to support computerbased teaching of English composition. We have...
Anders I. Mørch, William K. Cheung, Kelvin ...
CORR
2010
Springer
225views Education» more  CORR 2010»
14 years 9 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
IDA
2011
Springer
14 years 4 months ago
Ubiquitous Knowledge Discovery
Ubiquitous Knowledge Discovery is a new research area at the intersection of machine learning and data mining with mobile and distributed systems. In this paper the main character...
João Gama, Michael May
HT
2009
ACM
15 years 4 months ago
2LIPGarden: 3D hypermedia for everyone
The early Web was hailed for being easy to use, and what is more important, giving people a chance to participate in its growth. The Web3D was believed to have potential to be the...
Jacek Jankowski, Izabela Irzynska, Bill McDaniel, ...