Sciweavers

6651 search results - page 1210 / 1331
» Translating Web Data
Sort
View
129
Voted
SOUPS
2006
ACM
15 years 9 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
138
Voted
CAMP
2005
IEEE
15 years 9 months ago
Real-Time Low Level Feature Extraction for On-Board Robot Vision Systems
Abstract— Robot vision systems notoriously require large computing capabilities, rarely available on physical devices. Robots have limited embedded hardware, and almost all senso...
Roberto Pirrone, Giuseppe Careri, F. Saverio Fabia...
131
Voted
ESCIENCE
2005
IEEE
15 years 9 months ago
Publishing Persistent Grid Computations as WS Resources
Abstract Grid services can be composed into processes, providing a high level definition of the computations involved in terms of their data exchanges and control flow dependenci...
Thomas Heinis, Cesare Pautasso, Oliver Deak, Gusta...
126
Voted
IAT
2005
IEEE
15 years 9 months ago
Sharing Engineering Information and Knowledge
This paper describes an agent-based recommendation system developed to support knowledge acquisition and sharing processes. Its purpose is to aid the process of community building...
Mauro F. Koyama, Olga Nabuco, Francisco Edeneziano...
120
Voted
ICAC
2005
IEEE
15 years 9 months ago
Dynamic Black-Box Performance Model Estimation for Self-Tuning Regulators
Methods for automatically managing the performance of computing services must estimate a performance model of that service. This paper explores properties that are necessary for p...
Magnus Karlsson, Michele Covell
« Prev « First page 1210 / 1331 Last » Next »