Sciweavers

7839 search results - page 1415 / 1568
» What's there and what's not
Sort
View
ECRIME
2007
15 years 5 months ago
Fighting unicode-obfuscated spam
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Changwei Liu, Sid Stamm
ELPUB
2007
ACM
15 years 5 months ago
Openness in Higher Education: Open Source, Open Standards, Open Access
For national advisory services in the UK (UKOLN, CETIS, and OSS Watch), varieties of openness (open source software, open standards, and open access to research publications and d...
Brian Kelly, Scott Wilson, Randy Metcalfe
ELPUB
2007
ACM
15 years 5 months ago
Evaluating Digital Humanities Resources: The LAIRAH Project Checklist and the Internet Shakespeare Editions Project
The following paper presents a case study of the way that the research done by the LAIRAH project may be applied in the case of a real digital resource for humanities scholarship....
Claire Warwick, Melissa Terras, Isabel Galina, Pau...
ACMIDC
2009
15 years 5 months ago
Drama prototyping for the design of urban interactive systems for children
In this paper, we present Wi-swing, a case study approach in designing a networked playground for children located in a public garden. The approach adopted in the case study is ba...
Andrea Alessandrini, Antonio Rizzo, Elisa Rubegni
COCO
2010
Springer
153views Algorithms» more  COCO 2010»
15 years 5 months ago
Communication Complexity with Synchronized Clocks
Abstract—We consider two natural extensions of the communication complexity model that are inspired by distributed computing. In both models, two parties are equipped with synchr...
Russell Impagliazzo, Ryan Williams
« Prev « First page 1415 / 1568 Last » Next »