Sciweavers

2089 search results - page 155 / 418
» Finding Environment Guarantees
Sort
View
CHI
2008
ACM
15 years 6 months ago
Toped: enabling end-user programmers to validate data
Existing tools require end-user programmers (EUPs) to write regular expressions ("regexps") or even scripts to validate textual inputs, which is slow and error-prone. We...
Christopher Scaffidi, Brad A. Myers, Mary Shaw
SEC
2007
15 years 5 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
TREC
2003
15 years 5 months ago
Biomedical Text Retrieval System at Korea University
In this paper, we describe our retrieval system used for the primary task of genomics track at this year. Our primary goal in this task is to find a proper method for the domain-sp...
Young-In Song, Kyoung-Soo Han, Hee-Cheol Seo, Sang...
ICIS
1997
15 years 5 months ago
An information company in Mexico: extending the resource-based view of the firm
This paper extends the resource-based view of the firm to a less developed country situation by challenging three boundary conditions associated with the theory: first, the theory...
Sirkka L. Jarvenpaa, Dorothy E. Leidner
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 5 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries