Sciweavers

4172 search results - page 636 / 835
» Computing Machinery and Understanding
Sort
View
CCS
2008
ACM
15 years 6 months ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...
CCS
2008
ACM
15 years 6 months ago
Towards experimental evaluation of code obfuscation techniques
While many obfuscation schemes proposed, none of them satisfy any strong definition of obfuscation. Furthermore secure generalpurpose obfuscation algorithms have been proven to be...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
ITS
2010
Springer
145views Multimedia» more  ITS 2010»
15 years 6 months ago
Predictors of Transfer of Experimental Design Skills in Elementary and Middle School Children
A vital goal of instruction is to enable learners to transfer acquired knowledge to appropriate future situations. For elementary school children in middle-high-SES schools, “exp...
Stephanie Siler, David Klahr, Cressida Magaro, Kev...
CIKM
2008
Springer
15 years 6 months ago
Mining conceptual graphs for knowledge acquisition
This work addresses the use of computational linguistic analysis techniques for conceptual graphs learning from unstructured texts. A technique including both content mining and i...
Milagros Fernández, Eric Villemonte de la C...
ICSE
2010
IEEE-ACM
15 years 6 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...