Sciweavers

27692 search results - page 68 / 5539
» Where is ...
Sort
View
94
Voted
SEC
2007
15 years 2 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
78
Voted
AAAI
2006
15 years 2 months ago
Identifying and Generating Easy Sets of Constraints for Clustering
Clustering under constraints is a recent innovation in the artificial intelligence community that has yielded significant practical benefit. However, recent work has shown that fo...
Ian Davidson, S. S. Ravi
IJCAI
2001
15 years 2 months ago
Market Clearability
Market mechanisms play a central role in AI as a coordination tool in multiagent systems and as an application area for algorithm design. Mechanisms where buyers are directly clea...
Tuomas Sandholm, Subhash Suri
116
Voted
DIMACS
1996
15 years 2 months ago
On the Expression of Graph Properties in some Fragments of Monadic Second-Order Logic
: We review the expressibility of some basic graph properties in certain fragments of Monadic Second-Order logic, like the set of Monadic-NP formulas. We focus on cases where a pro...
Bruno Courcelle
HAID
2008
Springer
15 years 2 months ago
Multimodal Interaction: Real Context Studies on Mobile Digital Artefacts
The way users interact with mobile applications varies according to the context where they are. We conducted a study where users had to manipulate a multimodal questionnaire in 4 d...
Tiago Reis, Marco de Sá, Luís Carri&...